{"id":15727,"date":"2024-11-12T16:17:16","date_gmt":"2024-11-12T15:17:16","guid":{"rendered":"https:\/\/cyberschool.univ-rennes.fr\/?p=15727"},"modified":"2026-03-12T14:49:18","modified_gmt":"2026-03-12T13:49:18","slug":"new-success-for-our-second-cyber-thursday","status":"publish","type":"post","link":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/","title":{"rendered":"New Success for Our Second Cyber Thursday"},"content":{"rendered":"\n<p>CyberSchool enthusiastically welcomed the <strong>second edition of its <a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/community\/our-events\/cyber-thursday-strategy-psychology-technology-an-interdisciplinary-approach-to-three-pillars-of-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Thursday<\/a>, an event dedicated to exploring the many facets of cybersecurity.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<section class=\"sliderImg\">\n    <div class=\"contain-slider\">\n            <div class=\"sliderImgs\">\n\n                \n                    <div class=\"slide\">\n                        <picture>\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled@2x.webp 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled@2x.webp 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled@2x.jpg 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled@2x.jpg 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <img decoding=\"async\" src=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.jpg\" loading=\"lazy\" alt=\"Les intervenants lors de la table ronde\" \/>\n                        <\/picture>\n                    <\/div>\n\n                \n                    <div class=\"slide\">\n                        <picture>\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled@2x.webp 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled@2x.webp 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled@2x.jpg 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled@2x.jpg 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <img decoding=\"async\" src=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-2-min-scaled.jpg\" loading=\"lazy\" alt=\"L'amphith\u00e9\u00e2tre rempli lors de la table ronde.\" \/>\n                        <\/picture>\n                    <\/div>\n\n                \n                    <div class=\"slide\">\n                        <picture>\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled@2x.webp 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled@2x.webp 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled@2x.jpg 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled@2x.jpg 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <img decoding=\"async\" src=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-3-min-scaled.jpg\" loading=\"lazy\" alt=\"les intervenants lors de la table ronde\" \/>\n                        <\/picture>\n                    <\/div>\n\n                \n                    <div class=\"slide\">\n                        <picture>\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled@2x.webp 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled@2x.webp 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled@2x.jpg 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled@2x.jpg 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <img decoding=\"async\" src=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-4-min-scaled.jpg\" loading=\"lazy\" alt=\"les intervenants lors de la table ronde\" \/>\n                        <\/picture>\n                    <\/div>\n\n                \n                    <div class=\"slide\">\n                        <picture>\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled@2x.webp 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/webp\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled.webp, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled@2x.webp 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled@2x.jpg 2x\"\n                            media=\"(max-width: 480px)\"\n                            >\n                            <source\n                            type=\"image\/jpeg\"\n                            srcset=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled.jpg, https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled@2x.jpg 2x\"\n                            media=\"(min-width: 1280px)\"\n                            >\n                            <img decoding=\"async\" src=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-1-min-scaled.jpg\" loading=\"lazy\" alt=\"Discussions lors du cocktail\" \/>\n                        <\/picture>\n                    <\/div>\n\n                            <\/div>\n\n\n\n\n    <\/div>\n\n    <script>    \n        jQuery('.sliderImgs').slick({\n            infinite: true\n        });\n\n    <\/script>\n\n<\/section>\n\n\n\n<!--more-->\n\n\n\n<p><strong>Cybersecurity, at the crossroads of strategy, technology, and psychology, requires interdisciplinary collaboration to anticipate and counter threats to our information systems. <\/strong>During this engaging roundtable,<strong> four experts shared their insights and expertise.<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>The Missions of Cyber Defenders<\/strong><\/p>\n\n\n\n<p>Colonel Nicolas Pierson, Commander of Military Cyber Defence at <a href=\"https:\/\/www.defense.gouv.fr\/comcyber\/commandement-cyberdefense-comcyber\" target=\"_blank\" rel=\"noreferrer noopener\">COMCYBER<\/a>, presented the missions of cyber combatants:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protecting information systems (IS)<\/strong><\/li>\n\n\n\n<li><strong>Conducting the defence of the Ministry of Armed Forces\u2019 IS<\/strong><\/li>\n\n\n\n<li><strong>Planning and conducting military cyber defence operations.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>His presentation shed light on the challenges and strategic stakes of cybersecurity in a military context.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Understanding the Psychology of Cyber Attacks: Cognitive Biases<\/strong><\/p>\n\n\n\n<p>Cecilia Jourt Pineau, Founding President of <a href=\"https:\/\/www.cymind.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">CYMIND<\/a> and cognitive cybersecurity analyst, illustrated<strong> how cybercriminals exploit cognitive biases to manipulate users and organisations.<\/strong> By exploring different levels of human cognition (social, people, persona), she explained how these mechanisms are leveraged to deceive victims. This presentation provided essential insights into the psychological aspects of cyber threats.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Red Teaming: Testing System Resilience<\/strong><\/p>\n\n\n\n<p>Pierre Texier, Chief Technical Officer at <a href=\"https:\/\/www.erium.fr\/en\/homepage-v2\/\" target=\"_blank\" rel=\"noreferrer noopener\">ERIUM<\/a>, introduced the principles of<strong> Red Teaming, a method that involves simulating cyberattacks to assess system resilience.<\/strong> He also highlighted the strategic role of <strong>Security Operations Centers (SOC), which rely on advanced technologies and human expertise to defend infrastructures.<\/strong> This approach is crucial for testing and enhancing the robustness of existing defences.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Homomorphic Encryption: Securing Sensitive Data Processing<\/strong><\/p>\n\n\n\n<p>Sarah Girod, cryptologist and cybersecurity analyst at <a href=\"https:\/\/www.capgemini.com\/gb-en\/\" target=\"_blank\" rel=\"noreferrer noopener\">CAPGEMINI<\/a>, explained the <strong>concept of homomorphic encryption, a technique that enables calculations on encrypted data without the need for decryption<\/strong>. She emphasised the importance of this approach in maintaining data confidentiality and integrity while enabling its use in complex processes.<\/p>\n\n\n\n<p>\u2014<\/p>\n\n\n\n<p><strong>CyberSchool extends its warmest thanks to the speakers for their enriching presentations<\/strong> and to the students for their insightful questions and active participation, which greatly contributed to the success of this Cyber Thursday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberSchool enthusiastically welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.<\/p>\n","protected":false},"author":8,"featured_media":15715,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Success for Our Second Cyber Thursday - CyberSchool<\/title>\n<meta name=\"description\" content=\"CyberSchool welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Success for Our Second Cyber Thursday - CyberSchool\" \/>\n<meta property=\"og:description\" content=\"CyberSchool welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSchool\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CSchoolRennes\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-12T15:17:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:49:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1441\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ma\u00e9va Jeuland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CSchoolRennes\" \/>\n<meta name=\"twitter:site\" content=\"@CSchoolRennes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ma\u00e9va Jeuland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/\",\"name\":\"New Success for Our Second Cyber Thursday - CyberSchool\",\"isPartOf\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\"},\"datePublished\":\"2024-11-12T15:17:16+00:00\",\"dateModified\":\"2026-03-12T13:49:18+00:00\",\"author\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#\/schema\/person\/7754053289222109804e9a9ebdb99f3d\"},\"description\":\"CyberSchool welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Success for Our Second Cyber Thursday\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\",\"name\":\"CyberSchool\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#\/schema\/person\/7754053289222109804e9a9ebdb99f3d\",\"name\":\"Ma\u00e9va Jeuland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7261a58f283539e24d79f2cda9d251b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7261a58f283539e24d79f2cda9d251b1?s=96&d=mm&r=g\",\"caption\":\"Ma\u00e9va Jeuland\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Success for Our Second Cyber Thursday - CyberSchool","description":"CyberSchool welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/","og_locale":"en_US","og_type":"article","og_title":"New Success for Our Second Cyber Thursday - CyberSchool","og_description":"CyberSchool welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.","og_url":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/","og_site_name":"CyberSchool","article_publisher":"https:\/\/www.facebook.com\/CSchoolRennes\/","article_published_time":"2024-11-12T15:17:16+00:00","article_modified_time":"2026-03-12T13:49:18+00:00","og_image":[{"width":2560,"height":1441,"url":"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2024\/11\/jeudi-cyber-2-cyberschool-5-min-scaled.jpg","type":"image\/jpeg"}],"author":"Ma\u00e9va Jeuland","twitter_card":"summary_large_image","twitter_creator":"@CSchoolRennes","twitter_site":"@CSchoolRennes","twitter_misc":{"Written by":"Ma\u00e9va Jeuland","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/","name":"New Success for Our Second Cyber Thursday - CyberSchool","isPartOf":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website"},"datePublished":"2024-11-12T15:17:16+00:00","dateModified":"2026-03-12T13:49:18+00:00","author":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#\/schema\/person\/7754053289222109804e9a9ebdb99f3d"},"description":"CyberSchool welcomed the second edition of its Cyber Thursday, an event dedicated to exploring the many facets of cybersecurity.","breadcrumb":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/new-success-for-our-second-cyber-thursday\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/"},{"@type":"ListItem","position":2,"name":"New Success for Our Second Cyber Thursday"}]},{"@type":"WebSite","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/","name":"CyberSchool","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#\/schema\/person\/7754053289222109804e9a9ebdb99f3d","name":"Ma\u00e9va Jeuland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7261a58f283539e24d79f2cda9d251b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7261a58f283539e24d79f2cda9d251b1?s=96&d=mm&r=g","caption":"Ma\u00e9va Jeuland"}}]}},"_links":{"self":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/posts\/15727"}],"collection":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/comments?post=15727"}],"version-history":[{"count":2,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/posts\/15727\/revisions"}],"predecessor-version":[{"id":18547,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/posts\/15727\/revisions\/18547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media\/15715"}],"wp:attachment":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media?parent=15727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/categories?post=15727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/tags?post=15727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}