The presentation will include a live demonstration.
Since 2010, Erwan Broquaire is a project manager in the ITS & and road safety department of Cerema south-ouest. Erwan Broquaire drives studies on cyber-security concerns for road operators, including evaluation of firewalls or pen tests.
This can lead to rise an alert for security team and/or to block the port.
We have checked the transparency of this hack with several layer 2 protocols: no spanning tree topology change, vlan compliant, LLDP compliant (original switchs on both sides still see each other), etc.
In this week’s Capitol Chat, Capital Public Radio’s Capitol Bureau Chief Ben Adler explains the potential for California Democrats and Republicans reaching a deal to fix the state’s transportation infrastructure.
My talk will be about drone threats in general and how you can assess drone based threats.
After managing projects of traffic management equipments (traffic sensors, VMS, CCTV…), he drove the definition and deployment of data and energy networks to improve safety for 22 road tunnels.
Pierre-Yves Tanniou graduated as an engineer in electronics, signal processing (1990) and artificial intelligence (1991) at the polytechnic institute of Grenoble.
Pierre-Yves Tanniou drives studies on traffic management for french road operators, including definition and qualification of applications for traffic management centers.Particularly interesting will be looking at the drone threats in relation to: Dominique C.Brack is a recognized expert in information security, including identity theft, social media exposure, data breach, cyber security, human manipulation and online reputation management.Since 2016 he has also taken part in validation of autonomous vehicle experiments for the french ministry.Formerly he worked at SIER and DIRIF, the road operator for highways around Paris.Robert Wood is a security technologist, strategic advisor, and current Chief Security Officer.Throughout Robert's career he has worked with, advised, and led many security programs and initiatives including the trust and security program at Nuna and the red team practice at Cigital.At the same time however, the supply chain of a modern application has gotten significantly more complicated as dependency trees have exploded and more vendors get introduced.This talk outlines 10 tactics that organizations can adopt to manage the modern supply chain without introducing excessive friction.This talk is very much focused on process, specifically, 10 different tactics that participants can take and apply in their teams or organizations to manage supply chain risk, be it from vendors or OSS.To that end, I will be framing the problem up initially to talk about software composition analysis and dynamic dependency graphs as well as various cloud security and outsourced processor risks.Last year's conference appearance's: Software engineering today has rightfully embraced the open source and cloud ecosystem to move faster and focus valuable engineering time on new problems instead of ones that have already been solved.As a result, we’ve collectively achieved more than we ever have in terms of technical advancement and production of new services.He manages the development of the national video software solution of the Ministry in charge of transprot : Vizird.