BEGIN:VCALENDAR
X-WR-CALNAME:Public
X-WR-CALID:25ba1d2f-81ff-433e-9e3a-c61106ac1fdc:1446
PRODID:Zimbra-Calendar-Provider
VERSION:2.0
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:STANDARD
DTSTART:16010101T030000
TZOFFSETTO:+0100
TZOFFSETFROM:+0200
RRULE:FREQ=YEARLY;WKST=MO;INTERVAL=1;BYMONTH=10;BYDAY=-1SU
TZNAME:CET
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:16010101T020000
TZOFFSETTO:+0200
TZOFFSETFROM:+0100
RRULE:FREQ=YEARLY;WKST=MO;INTERVAL=1;BYMONTH=3;BYDAY=-1SU
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Brussels
BEGIN:STANDARD
DTSTART:16010101T030000
TZOFFSETTO:+0100
TZOFFSETFROM:+0200
RRULE:FREQ=YEARLY;WKST=MO;INTERVAL=1;BYMONTH=10;BYDAY=-1SU
TZNAME:CET
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:16010101T020000
TZOFFSETTO:+0200
TZOFFSETFROM:+0100
RRULE:FREQ=YEARLY;WKST=MO;INTERVAL=1;BYMONTH=3;BYDAY=-1SU
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Belgrade
BEGIN:STANDARD
DTSTART:16010101T030000
TZOFFSETTO:+0100
TZOFFSETFROM:+0200
RRULE:FREQ=YEARLY;WKST=MO;INTERVAL=1;BYMONTH=10;BYDAY=-1SU
TZNAME:CET
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:16010101T020000
TZOFFSETTO:+0200
TZOFFSETFROM:+0100
RRULE:FREQ=YEARLY;WKST=MO;INTERVAL=1;BYMONTH=3;BYDAY=-1SU
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:F04BFFE0-D3AC-45B2-BD81-D4873AD708D8
SUMMARY:[talk.cybercni.fr] Hasan Ibne Akram\, Matrickz\, DE) – Automotive Cy
 bersecurity – How to make millions in a $5.1B industry?
DESCRIPTION:Abstract\nAccording to a recent McKenzie Whitepaper Automotive C
 ybersecurity has been estimated to be a $5.1 billion industry in 2021.\n\nTh
 is talk gives a brief history of Automotive Cybersecurity where it got start
 ed why it’s necessary what are the challenges\, what is the future of Cybers
 ecurity and more importantly how in history Automotive Cybersecurity is goin
 g to be the enabler of technologies like Autonomous Driving Technology is li
 ke autonomous driving.\n\nMoreover\, it will show some tremendous opportunit
 ies that you guys can leverage and utilize in order to make millions or even
  billions in this massive industry.\n\nHasan Ibne Akram\nDr. Hasan Ibne Akra
 m is a computer scientist\, serial entrepreneur and the host of the Podcast 
 “Autonomous Vehicle Safety & Security”. He is specialized in Embedded Securi
 ty and Machine Learning and currently working as the founding CEO of Matrick
 z GmbH\, a company specialized in automotive software and security based in 
 Munich.\n\nHe obtained his MSc degree in Computer Science in 2008 from Techn
 ische Universität Darmstadt and a PhD degree in Computer Science from Techni
 sche Universität München in 2013. Moreover\, he has successfully participate
 d in the Harvard Leadership Program at Harvard University\, USA in 2016.\n\n
 He has more than 11 years of experience in automotive industry and worked fo
 r two of the major German Automotive-OEMs as an external consultant. He has 
 published a number of peer-reviewed papers and has received the I-Centric Be
 st Paper Award in 2008.\n\n# The speaker series\n\nProtecting against cyber 
 risks is the domain of Cybersecurity. The Cyber CNI Speaker series wants to 
 raise awareness and understanding of cybersecurity topics. It wants to enabl
 e a continuous dialog between experts from industry and academia and the gen
 eral public\, including individuals\, families\, companies from small to lar
 ge sizes\, and public bodies – in short everyone\, since cybersecurity is re
 levant for each of us.\n\nThe Cyber CNI speaker series is a free monthly eve
 nt on the last Wednesday of the month from 17h-18h30. The event consists of 
 an expert talk of about 40 minutes followed by 30 minutes discussion.\n\nThe
  events happen in the Grand Amphitheatre at IMT Atlantique in Rennes (Cesson
 -Sévigné) AND are broadcasted live over Youtube (https://talk.cybercni.fr/)\
 , enabling global remote participation and including a tool for participatin
 g in the discussion.\nYou are cordially invited to participate. Please safe 
 the dates and subscribe to receive email notifications!
LOCATION:https://talk.cybercni.fr/
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=ACCEPTED:mailto:mar
 c-oliver.pahl@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:pahl-alumni@list.net.in.tum.de
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:pahl-staff@list.net.in.tum.de
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20210728T170000
DTEND;TZID="Europe/Paris":20210728T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20210727T162945Z
DTSTAMP:20210716T133016Z
SEQUENCE:4
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:8CD8EC3F-5189-4CCE-B845-9E306EA633B8
SUMMARY:[talk.cybercni.fr] Carl Denis (AG KRITIS)\, Resilience for Critical 
 Infrastructures: a Volunteer Cyber Brigade
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20210825T170000
DTEND;TZID="Europe/Paris":20210825T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20210723T102808Z
DTSTAMP:20210723T102808Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:61F98D1A-A0D6-41CC-B8BB-13B78BFCFB3B
RRULE:FREQ=DAILY;UNTIL=20211203T225959Z;INTERVAL=1
SUMMARY:4th Future-IoT.org PhD school: IoT meets Cyber
DESCRIPTION:************************\n** 4th edition of the Future-IoT PhD s
 chool series “IoT meets Cyber and Security"\n** 29.11.-3.12.2021 in Rennes\,
  France. \n** With keynotes and hands-on sessions from Siemens\, Airbus\, Ce
 lonis and many more.\n** On-Site (recommended) and online (reduced) particip
 ation possible. \n** More info and registration:\n**\n** https://school.futu
 re-iot.org/\n************************\n\nThe German-French Academy for the I
 ndustry of the Future and the chaire Cyber CNI in collaboration with the OCI
 F team\, the IRISA lab and many more organize the 4th Future-IoT PhD school 
 – this time a winter school. The school is under the motto “IoT meets Cyber”
 . So it is about software and algorithms in the Internet of Things and Cyber
 -Physical systems.\n\nThe 4th Future-IoT winter school takes place from Nov 
 29-Dec 3\, 2021 in Rennes\, France. The event will be hybrid\, on-site\, via
  zoom\, and via YouTube and LinkedIN. Please inform your friends and check t
 he program at https://school.future-iot.org/. We look forward to welcoming y
 ou!\n\nThis year’s edition focuses on different aspects of the software cybe
 rspace – the algorithms that move the things around us -\, including cyberse
 curity. Software drives the critical infrastructures around us\, such as wat
 er and energy supply\, communication\, transportation\, banking\, manufactur
 ing and health services.\n\nThe 4th Future-IoT school takes place in Rennes\
 , only 1\,5h by train from Paris. The city and the added value of the on-sit
 e participation with the hackathon with people on-site\, much better network
 ing\, and last but not least the opportunity to getting to know the city mak
 e this the best option. At the same time\, you can also interactively partic
 ipate and network via zoom\, or you jus follow and interact over YouTube and
  LinkedIN.\n\nPlease inform your friends about the event and participate you
 rself! On-site for the full experience\, via Zoom for half of the experience
 \, and via YouTube and LinkedIN for the keynotes only.\n\nWe are looking for
 ward to welcoming you in Rennes!\n\n- Program: https://school.future-iot.org
 /\n- Registration: https://school.future-iot.org/register\n\n- Impressions f
 rom 2020: https://future-iot.org/category/2020iotmeetssecurity/\n- Impressio
 ns from 2019: https://future-iot.org/category/2019iotmeetsai/"
LOCATION:Irisa\n263 Avenue Général Leclerc\, 35700 Rennes\, France
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-APPLE-MAPKIT-HANDLE=CAESlwIIrk0QtrzM
 reSgpJoFGhIJGYHC6tkOSEARHQwry8Y5+r8icwoGRnJhbmNlEgJGUhoIQnJpdHRhbnkqD0lsbGUt
 ZXQtVmlsYWluZTIGUmVubmVzOgUzNTcwMFIYQXZlbnVlIEfDqW7DqXJhbCBMZWNsZXJjWgMyNjNi
 HDI2MyBBdmVudWUgR8OpbsOpcmFsIExlY2xlcmMqBUlyaXNhMhwyNjMgQXZlbnVlIEfDqW7DqXJh
 bCBMZWNsZXJjMgwzNTcwMCBSZW5uZXMyBkZyYW5jZTgvWkIKJAi2vMyt5KCkmgUSEgkZgcLq2Q5I
 QBEdDCvLxjn6vxiuTZADAaIfGQi2vMyt5KCkmgUaDQoFSXJpc2EQACoCZnI:\;X-APPLE-RADIUS
 =141.1750344677108\;X-TITLE="Irisa\n263 Avenue Général Leclerc\, 35700 Renne
 s\, France":geo:48.116025\,-1.639106
DTSTART;TZID="Europe/Paris":20211129T090000
DTEND;TZID="Europe/Paris":20211129T210000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20211109T143541Z
DTSTAMP:20210723T214440Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:734DAA5F-C763-4605-A73A-058285F09D1A
SUMMARY:[talk.cybercni.fr] Guillaume Neau (AWS). – T.B.A.
DESCRIPTION:On Wed\, Jan 11th\, 2023\, 2pm CET\, Guillaume Neau (AWS\, FR)\,
  will talk about “Securing the Cloud: Encryption and Data Protection“. You a
 re cordially invited to join the free live stream on youtube and LinkedIn! P
 lease share the link https://talk.cybercni.fr/26 with your interested friend
 s!\n\nProtecting against cyber risks is the domain of Cybersecurity. The Cyb
 er CNI Speaker series wants to raise awareness and understanding of cybersec
 urity topics. It wants to enable a continuous dialog between experts from in
 dustry and academia and the general public\, including individuals\, familie
 s\, companies from small to large sizes\, and public bodies – in short every
 one\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI speak
 er series is a free monthly event on the last Wednesday of the month from 17
 h-18h30. The event consists of an expert talk of about 40 minutes followed b
 y 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatre at I
 MT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over Youtu
 be (https://talk.cybercni.fr/)\, enabling global remote participation and in
 cluding a tool for participating in the discussion.\nYou are cordially invit
 ed to participate. Please safe the dates and subscribe to receive email noti
 fications!
LOCATION:https://talk.cybercni.fr/26
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230111T140000
DTEND;TZID="Europe/Paris":20230111T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20221214T153558Z
DTSTAMP:20211213T210912Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:F6445FE4-ABEF-469B-960E-AD39825ED660
SUMMARY:[talk.cybercni.fr] Nicolas RAZY and Nicolas LORIOT (Airbus) T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220615T170000
DTEND;TZID="Europe/Paris":20220615T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20220130T232534Z
DTSTAMP:20220130T232535Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:F37994FD-3982-455F-9350-412D9AEAA4C6
SUMMARY:[Blocker] 5th Future-IoT: IoT meets Autonomy
DESCRIPTION:The planning starts. These are the first considerations.
LOCATION:Einstein Center Digital Future\, Wilhelmstraße 67\, 10117 Berlin\, 
 Deutschland
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-APPLE-MAPKIT-HANDLE=CAES8QEI2TIaEgmo
 HmlwW0JKQBEcuckD7MIqQCJuCgdHZXJtYW55EgJERRoGQmVybGluKgZCZXJsaW4yBkJlcmxpbjoF
 MTAxMTdCC0NpdHkgQ2VudHJlUg5XaWxoZWxtc3RyYcOfZVoCNjdiEVdpbGhlbG1zdHJhw59lIDY3
 igELQ2l0eSBDZW50cmUqEVdpbGhlbG1zdHJhw59lIDY3MhFXaWxoZWxtc3RyYcOfZSA2NzIMMTAx
 MTcgQmVybGluMgdHZXJtYW55ODlAAFonCiUSEgmoHmlwW0JKQBEcuckD7MIqQBjZMiCouNjF4Kfe
 xbgBkAMB;X-APPLE-RADIUS=70.58738911128133;X-TITLE="Einstein Center Digital F
 uture, Wilhelmstraße 67, 10117 Berlin, Deutschland":geo:52.518416\,13.380707
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;VALUE=DATE:20220829
DTEND;VALUE=DATE:20220903
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-ALLDAYEVENT:TRUE
X-MICROSOFT-CDO-INTENDEDSTATUS:FREE
TRANSP:TRANSPARENT
LAST-MODIFIED:20220210T201443Z
DTSTAMP:20220210T201451Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:67AD6932-CE5F-4F15-BE4D-4C8E7B7A54A1
SUMMARY:[talk.cybercni.fr]
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
ATTENDEE;CN=DECOSSIN Etienne;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT
 =NEEDS-ACTION;RSVP=TRUE:mailto:etienne.decossin@edf.fr
ATTENDEE;CN=Hassan Chaitou;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=A
 CCEPTED:mailto:hassan.chaitou@telecom-paris.fr
ATTENDEE;CN=Jean Leneutre;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NE
 EDS-ACTION;RSVP=TRUE:mailto:jean.leneutre@telecom-paris.fr
ATTENDEE;CN=MOINEAU Thierry;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=
 NEEDS-ACTION;RSVP=TRUE:mailto:thierry.moineau@bnpparibas.com
ATTENDEE;CN=Pahl-staff@list.net.in.tum.de;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICI
 PANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE:mailto:Pahl-staff@list.net.in.tum.de
ATTENDEE;CN=Priscillia CREACH;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTA
 T=DECLINED:mailto:priscillia.creach@imt-atlantique.fr
ATTENDEE;CN=Thomas Robert;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NE
 EDS-ACTION;RSVP=TRUE:mailto:thomas.robert@telecom-paris.fr
ATTENDEE;CN=alexkab;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=ACCEPTED
 :mailto:alexandre.kabil@imt-atlantique.fr
ATTENDEE;CN=announce@cybercni.fr;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PART
 STAT=NEEDS-ACTION;RSVP=TRUE:mailto:announce@cybercni.fr
ATTENDEE;CN=pahl-alumni@list.net.in.tum.de;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTIC
 IPANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE:mailto:pahl-alumni@list.net.in.tum.de
ATTENDEE;CN=Dominique PASTOR;PARTSTAT=DECLINED:mailto:dominique.pastor@imt-a
 tlantique.fr
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20220513T170000
DTEND;TZID="Europe/Paris":20220513T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20220505T131123Z
DTSTAMP:20220505T131126Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:4D8314E3-93BC-442B-96D7-41EDB692C5DD
SUMMARY:[talk.cybercni.fr] Nicolas RAZY and Nicolas LORIOT (Airbus) T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220713T170000
DTEND;TZID="Europe/Paris":20220713T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20220615T153748Z
DTSTAMP:20220615T153748Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:d862865d-6f54-458f-bdf9-4cc79b00c08d
SUMMARY:La Chaire CyberCNI participe à l'ECW 2022 !
DESCRIPTION:\n
X-ALT-DESC;FMTTYPE=text/html:<html><body id='htmlmode'></body></html>
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ORGANIZER;SENT-BY="mailto:fabienne.rodionoff@imt-atlantique.fr":mailto:cyber
 cni@imt-atlantique.fr
X-MS-OLK-SENDER:mailto:fabienne.rodionoff@imt-atlantique.fr
DTSTART;VALUE=DATE:20221115
DTEND;VALUE=DATE:20221118
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-ALLDAYEVENT:TRUE
X-MICROSOFT-CDO-INTENDEDSTATUS:FREE
TRANSP:TRANSPARENT
LAST-MODIFIED:20220708T073240Z
DTSTAMP:20220708T073240Z
SEQUENCE:0
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER;RELATED=START:-PT15M
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
BEGIN:VEVENT
UID:98574665-db83-4c46-8a7d-11f8e5e230da
SUMMARY:ECW 2022 : session Chaire cyberCNI
DESCRIPTION:D es avancées en matière de sécurisation des infrastructures cri
 tiques – La chaire cyberCNI \n\nLes infrastructures critiques sont des actif
 s qui sont vitaux pour le fonctionnement d'une société ou de l'économie comm
 e la production d’électricité\, de gaz\, de pétrole\, l’approvisionnement en
  eau\, la santé publique\, les transports aériens ou ferroviaires\, la polic
 e\, l’armée. \nLa chaire cybersécurité des infrastructures critiques (cyberC
 NI.fr) est consacrée à la recherche\, l'innovation et l'enseignement dans le
  domaine de la cybersécurité de ces infrastructures critiques. \nDirigée par
  le Prof. Dr. Marc-Oliver Pahl\, elle a été fondée en 2016. Les partenaires 
 industriels actuels sont Airbus\, BNP Paribas\, EDF\, SNCF et la région Bret
 agne. CyberCNI est hébergée à IMT Atlantique dans le département SRCD au cam
 pus de Rennes\, et ses partenaires Télécom Paris et Télécom Sudparis. \nAu c
 ours de cette session\, découvrez l’écosystème de la chaire Cyber CNI et com
 prenez la vie de la chaire et les défis de la cybersécurité sous l’angle de 
 ses partenaires. \nLa deuxième partie est consacrée aux highlights de la rec
 herche des post-doctorants et des doctorants de la chaire. Elle se terminera
  par une table ronde sur les défis et les opportunités de la cybersécurité p
 our les infrastructures critiques. \nAdvances in securing critical infrastru
 ctures - The cyberCNI industrial Chair \n\nCritical infrastructures are asse
 ts that are vital to the functioning of a society or economy\, such as the p
 roduction of electricity\, gas\, oil\, water supply\, public health\, air or
  rail transport\, the police\, the army. \nThe Chair for Cybersecurity in Cr
 itical Networked Infrastructures (cyberCNI.fr) is dedicated to research\, in
 novation and teaching in the field of cybersecurity for critical infrastruct
 ures. \nHeaded by Prof. Dr. Marc-Oliver Pahl\, it was founded in 2016. Curre
 nt industrial partners include Airbus\, BNP Paribas\, EDF\, SNCF and the Bri
 ttany region. CyberCNI is hosted at IMT Atlantique in the SRCD department at
  the Rennes campus\, and its partners Télécom Paris and Télécom Sudparis. \n
 During the first session you will discover the ecosystem of the Cyber CNI ch
 air. You will understand the life at chair and the challenges of cybersecuri
 ty from the perspective of its partners. \nThe second session is dedicated t
 o the research highlights of the Chair's post-doctoral and doctoral students
 . It will end with a round table on the challenges and opportunities of cybe
 rsecurity for critical infrastructures. \n
X-ALT-DESC;FMTTYPE=text/html:<html><body id='htmlmode'><div style="font-fami
 ly: arial\, helvetica\, sans-serif\; font-size: 12pt\; color: #000000"><div>
 \n\n<h2>D<span style="font-weight:normal\;mso-bidi-font-weight:bold">es avan
 cées en\nmatière de sécurisation des infrastructures critiques</span> – La c
 haire\ncyberCNI</h2>\n\n<p class="MsoNormal">Les infrastructures critiques s
 ont des actifs qui sont vitaux\npour le fonctionnement d'une société ou de l
 'économie comme la production\nd’électricité\, de gaz\, de pétrole\, l’appro
 visionnement en eau\, la santé\npublique\, les transports aériens ou ferrovi
 aires\, la police\, l’armée.</p>\n\n<p class="MsoNormal"><b style="mso-bidi-
 font-weight:normal">La chaire cybersécurité\ndes infrastructures critiques (
 cyberCNI.fr) est consacrée à la recherche\,\nl'innovation et l'enseignement 
 dans le domaine de la cybersécurité de ces\ninfrastructures critiques.</b></
 p>\n\n<p class="MsoNormal">Dirigée par le Prof. Dr. Marc-Oliver Pahl\, elle 
 a été fondée\nen 2016. Les partenaires industriels actuels sont Airbus\, BNP
  Paribas\, EDF\,\nSNCF et la région Bretagne. CyberCNI est hébergée à IMT At
 lantique dans le\ndépartement SRCD au campus de Rennes\, et ses partenaires 
 Télécom Paris et\nTélécom Sudparis.</p>\n\n<p class="MsoNormal">Au cours de 
 cette session\, découvrez l’écosystème de la\nchaire Cyber CNI et comprenez 
 la vie de la chaire et les défis de la\ncybersécurité sous l’angle de ses pa
 rtenaires.</p>\n\n<p class="MsoNormal">La deuxième partie est consacrée aux 
 highlights de la\nrecherche des post-doctorants et des doctorants de la chai
 re. Elle se terminera\npar une table ronde sur les défis et les opportunités
  de la cybersécurité pour\nles infrastructures critiques.</p>\n\n<p class="M
 soNormal"><span style="font-family:&quot\;Calibri Light&quot\;\,sans-serif\;
 \nmso-ascii-theme-font:major-latin\;mso-hansi-theme-font:major-latin\;mso-bi
 di-theme-font:\nmajor-latin">&nbsp\;</span></p>\n\n<h2><span style="mso-ansi
 -language:EN-US" lang="EN-US">Advances in securing\ncritical infrastructures
  - The cyberCNI industrial Chair</span><span style="mso-ansi-language:EN-US\
 ;font-weight:normal\;mso-bidi-font-weight:\nbold" lang="EN-US"></span></h2>\
 n\n<p class="MsoNormal"><span style="mso-ansi-language:EN-US" lang="EN-US">C
 ritical\ninfrastructures are assets that are vital to the functioning of a s
 ociety or\neconomy\, such as the production of electricity\, gas\, oil\, wat
 er supply\, public\nhealth\, air or rail transport\, the police\, the army. 
 </span></p>\n\n<p class="MsoNormal"><b><span style="mso-ansi-language:EN-US"
  lang="EN-US">The\nChair for Cybersecurity in Critical Networked Infrastruct
 ures (cyberCNI.fr) is\ndedicated to research\, innovation and teaching in th
 e field of cybersecurity\nfor critical infrastructures.</span></b></p>\n\n<p
  class="MsoNormal"><span style="mso-ansi-language:EN-US" lang="EN-US">Headed
  by\nProf. Dr. Marc-Oliver Pahl\, it was founded in 2016. Current industrial
  partners\ninclude Airbus\, BNP Paribas\, EDF\, SNCF and the Brittany region
 . CyberCNI is\nhosted at IMT Atlantique in the SRCD department at the Rennes
  campus\, and its\npartners Télécom Paris and Télécom Sudparis.</span></p>\n
 \n<p class="MsoNormal"><span style="mso-ansi-language:EN-US" lang="EN-US">Du
 ring the\nfirst session you will discover the ecosystem of the Cyber CNI cha
 ir. You will\nunderstand the life at chair and the challenges of cybersecuri
 ty from the perspective\nof its partners.</span></p>\n\n<p class="MsoNormal"
 ><span style="mso-ansi-language:EN-US" lang="EN-US">The second\nsession is d
 edicated to the research highlights of the Chair's post-doctoral\nand doctor
 al students. It will end with a round table on the challenges and\nopportuni
 ties of cybersecurity for critical infrastructures.</span></p>\n\n<!--[if gt
 e mso 9]><xml>\n <o:OfficeDocumentSettings>\n  <o:AllowPNG/>\n </o:OfficeDoc
 umentSettings>\n</xml><![endif]--><!--[if gte mso 9]><xml>\n <w:WordDocument
 >\n  <w:View>Normal</w:View>\n  <w:Zoom>0</w:Zoom>\n  <w:TrackMoves/>\n  <w:
 TrackFormatting/>\n  <w:HyphenationZone>21</w:HyphenationZone>\n  <w:Punctua
 tionKerning/>\n  <w:ValidateAgainstSchemas/>\n  <w:SaveIfXMLInvalid>false</w
 :SaveIfXMLInvalid>\n  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>\n  
 <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>\n  <w:DoNot
 PromoteQF/>\n  <w:LidThemeOther>FR</w:LidThemeOther>\n  <w:LidThemeAsian>X-N
 ONE</w:LidThemeAsian>\n  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexS
 cript>\n  <w:Compatibility>\n   <w:BreakWrappedTables/>\n   <w:SnapToGridInC
 ell/>\n   <w:WrapTextWithPunct/>\n   <w:UseAsianBreakRules/>\n   <w:DontGrow
 Autofit/>\n   <w:SplitPgBreakAndParaMark/>\n   <w:EnableOpenTypeKerning/>\n 
   <w:DontFlipMirrorIndents/>\n   <w:OverrideTableStyleHps/>\n  </w:Compatibi
 lity>\n  <m:mathPr>\n   <m:mathFont m:val="Cambria Math"/>\n   <m:brkBin m:v
 al="before"/>\n   <m:brkBinSub m:val="&#45\;-"/>\n   <m:smallFrac m:val="off
 "/>\n   <m:dispDef/>\n   <m:lMargin m:val="0"/>\n   <m:rMargin m:val="0"/>\n
    <m:defJc m:val="centerGroup"/>\n   <m:wrapIndent m:val="1440"/>\n   <m:in
 tLim m:val="subSup"/>\n   <m:naryLim m:val="undOvr"/>\n  </m:mathPr></w:Word
 Document>\n</xml><![endif]--><!--[if gte mso 9]><xml>\n <w:LatentStyles DefL
 ockedState="false" DefUnhideWhenUsed="false"\n  DefSemiHidden="false" DefQFo
 rmat="false" DefPriority="99"\n  LatentStyleCount="375">\n  <w:LsdException 
 Locked="false" Priority="0" QFormat="true" Name="Normal"/>\n  <w:LsdExceptio
 n Locked="false" Priority="9" QFormat="true" Name="heading 1"/>\n  <w:LsdExc
 eption Locked="false" Priority="9" SemiHidden="true"\n   UnhideWhenUsed="tru
 e" QFormat="true" Name="heading 2"/>\n  <w:LsdException Locked="false" Prior
 ity="9" SemiHidden="true"\n   UnhideWhenUsed="true" QFormat="true" Name="hea
 ding 3"/>\n  <w:LsdException Locked="false" Priority="9" SemiHidden="true"\n
    UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>\n  <w:LsdExceptio
 n Locked="false" Priority="9" SemiHidden="true"\n   UnhideWhenUsed="true" QF
 ormat="true" Name="heading 5"/>\n  <w:LsdException Locked="false" Priority="
 9" SemiHidden="true"\n   UnhideWhenUsed="true" QFormat="true" Name="heading 
 6"/>\n  <w:LsdException Locked="false" Priority="9" SemiHidden="true"\n   Un
 hideWhenUsed="true" QFormat="true" Name="heading 7"/>\n  <w:LsdException Loc
 ked="false" Priority="9" SemiHidden="true"\n   UnhideWhenUsed="true" QFormat
 ="true" Name="heading 8"/>\n  <w:LsdException Locked="false" Priority="9" Se
 miHidden="true"\n   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>\
 n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n 
   Name="index 1"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhid
 eWhenUsed="true"\n   Name="index 2"/>\n  <w:LsdException Locked="false" Semi
 Hidden="true" UnhideWhenUsed="true"\n   Name="index 3"/>\n  <w:LsdException 
 Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="index 4"/>\
 n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n 
   Name="index 5"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhid
 eWhenUsed="true"\n   Name="index 6"/>\n  <w:LsdException Locked="false" Semi
 Hidden="true" UnhideWhenUsed="true"\n   Name="index 7"/>\n  <w:LsdException 
 Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="index 8"/>\
 n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n 
   Name="index 9"/>\n  <w:LsdException Locked="false" Priority="39" SemiHidde
 n="true"\n   UnhideWhenUsed="true" Name="toc 1"/>\n  <w:LsdException Locked=
 "false" Priority="39" SemiHidden="true"\n   UnhideWhenUsed="true" Name="toc 
 2"/>\n  <w:LsdException Locked="false" Priority="39" SemiHidden="true"\n   U
 nhideWhenUsed="true" Name="toc 3"/>\n  <w:LsdException Locked="false" Priori
 ty="39" SemiHidden="true"\n   UnhideWhenUsed="true" Name="toc 4"/>\n  <w:Lsd
 Exception Locked="false" Priority="39" SemiHidden="true"\n   UnhideWhenUsed=
 "true" Name="toc 5"/>\n  <w:LsdException Locked="false" Priority="39" SemiHi
 dden="true"\n   UnhideWhenUsed="true" Name="toc 6"/>\n  <w:LsdException Lock
 ed="false" Priority="39" SemiHidden="true"\n   UnhideWhenUsed="true" Name="t
 oc 7"/>\n  <w:LsdException Locked="false" Priority="39" SemiHidden="true"\n 
   UnhideWhenUsed="true" Name="toc 8"/>\n  <w:LsdException Locked="false" Pri
 ority="39" SemiHidden="true"\n   UnhideWhenUsed="true" Name="toc 9"/>\n  <w:
 LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name
 ="Normal Indent"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhid
 eWhenUsed="true"\n   Name="footnote text"/>\n  <w:LsdException Locked="false
 " SemiHidden="true" UnhideWhenUsed="true"\n   Name="annotation text"/>\n  <w
 :LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Nam
 e="header"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenU
 sed="true"\n   Name="footer"/>\n  <w:LsdException Locked="false" SemiHidden=
 "true" UnhideWhenUsed="true"\n   Name="index heading"/>\n  <w:LsdException L
 ocked="false" Priority="35" SemiHidden="true"\n   UnhideWhenUsed="true" QFor
 mat="true" Name="caption"/>\n  <w:LsdException Locked="false" SemiHidden="tr
 ue" UnhideWhenUsed="true"\n   Name="table of figures"/>\n  <w:LsdException L
 ocked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="envelope add
 ress"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="
 true"\n   Name="envelope return"/>\n  <w:LsdException Locked="false" SemiHid
 den="true" UnhideWhenUsed="true"\n   Name="footnote reference"/>\n  <w:LsdEx
 ception Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="ann
 otation reference"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unh
 ideWhenUsed="true"\n   Name="line number"/>\n  <w:LsdException Locked="false
 " SemiHidden="true" UnhideWhenUsed="true"\n   Name="page number"/>\n  <w:Lsd
 Exception Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="e
 ndnote reference"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhi
 deWhenUsed="true"\n   Name="endnote text"/>\n  <w:LsdException Locked="false
 " SemiHidden="true" UnhideWhenUsed="true"\n   Name="table of authorities"/>\
 n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n 
   Name="macro"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideW
 henUsed="true"\n   Name="toa heading"/>\n  <w:LsdException Locked="false" Se
 miHidden="true" UnhideWhenUsed="true"\n   Name="List"/>\n  <w:LsdException L
 ocked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List Bullet"
 />\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
 \n   Name="List Number"/>\n  <w:LsdException Locked="false" SemiHidden="true
 " UnhideWhenUsed="true"\n   Name="List 2"/>\n  <w:LsdException Locked="false
 " SemiHidden="true" UnhideWhenUsed="true"\n   Name="List 3"/>\n  <w:LsdExcep
 tion Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List 4
 "/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true
 "\n   Name="List 5"/>\n  <w:LsdException Locked="false" SemiHidden="true" Un
 hideWhenUsed="true"\n   Name="List Bullet 2"/>\n  <w:LsdException Locked="fa
 lse" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List Bullet 3"/>\n  <
 w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Na
 me="List Bullet 4"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unh
 ideWhenUsed="true"\n   Name="List Bullet 5"/>\n  <w:LsdException Locked="fal
 se" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List Number 2"/>\n  <w
 :LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Nam
 e="List Number 3"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhi
 deWhenUsed="true"\n   Name="List Number 4"/>\n  <w:LsdException Locked="fals
 e" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List Number 5"/>\n  <w:
 LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>\n  <
 w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Na
 me="Closing"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhe
 nUsed="true"\n   Name="Signature"/>\n  <w:LsdException Locked="false" Priori
 ty="1" SemiHidden="true"\n   UnhideWhenUsed="true" Name="Default Paragraph F
 ont"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="t
 rue"\n   Name="Body Text"/>\n  <w:LsdException Locked="false" SemiHidden="tr
 ue" UnhideWhenUsed="true"\n   Name="Body Text Indent"/>\n  <w:LsdException L
 ocked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List Continu
 e"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="tru
 e"\n   Name="List Continue 2"/>\n  <w:LsdException Locked="false" SemiHidden
 ="true" UnhideWhenUsed="true"\n   Name="List Continue 3"/>\n  <w:LsdExceptio
 n Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="List Cont
 inue 4"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed
 ="true"\n   Name="List Continue 5"/>\n  <w:LsdException Locked="false" SemiH
 idden="true" UnhideWhenUsed="true"\n   Name="Message Header"/>\n  <w:LsdExce
 ption Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>\n  <w:Ls
 dException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="
 Salutation"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhen
 Used="true"\n   Name="Date"/>\n  <w:LsdException Locked="false" SemiHidden="
 true" UnhideWhenUsed="true"\n   Name="Body Text First Indent"/>\n  <w:LsdExc
 eption Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Body
  Text First Indent 2"/>\n  <w:LsdException Locked="false" SemiHidden="true" 
 UnhideWhenUsed="true"\n   Name="Note Heading"/>\n  <w:LsdException Locked="f
 alse" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Body Text 2"/>\n  <w
 :LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Nam
 e="Body Text 3"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhide
 WhenUsed="true"\n   Name="Body Text Indent 2"/>\n  <w:LsdException Locked="f
 alse" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Body Text Indent 3"/
 >\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\
 n   Name="Block Text"/>\n  <w:LsdException Locked="false" SemiHidden="true" 
 UnhideWhenUsed="true"\n   Name="Hyperlink"/>\n  <w:LsdException Locked="fals
 e" SemiHidden="true" UnhideWhenUsed="true"\n   Name="FollowedHyperlink"/>\n 
  <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
 \n  <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphas
 is"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="tr
 ue"\n   Name="Document Map"/>\n  <w:LsdException Locked="false" SemiHidden="
 true" UnhideWhenUsed="true"\n   Name="Plain Text"/>\n  <w:LsdException Locke
 d="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="E-mail Signature
 "/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true
 "\n   Name="HTML Top of Form"/>\n  <w:LsdException Locked="false" SemiHidden
 ="true" UnhideWhenUsed="true"\n   Name="HTML Bottom of Form"/>\n  <w:LsdExce
 ption Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Norma
 l (Web)"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUse
 d="true"\n   Name="HTML Acronym"/>\n  <w:LsdException Locked="false" SemiHid
 den="true" UnhideWhenUsed="true"\n   Name="HTML Address"/>\n  <w:LsdExceptio
 n Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="HTML Cite
 "/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true
 "\n   Name="HTML Code"/>\n  <w:LsdException Locked="false" SemiHidden="true"
  UnhideWhenUsed="true"\n   Name="HTML Definition"/>\n  <w:LsdException Locke
 d="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="HTML Keyboard"/>
 \n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n
    Name="HTML Preformatted"/>\n  <w:LsdException Locked="false" SemiHidden="
 true" UnhideWhenUsed="true"\n   Name="HTML Sample"/>\n  <w:LsdException Lock
 ed="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="HTML Typewriter
 "/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true
 "\n   Name="HTML Variable"/>\n  <w:LsdException Locked="false" SemiHidden="t
 rue" UnhideWhenUsed="true"\n   Name="Normal Table"/>\n  <w:LsdException Lock
 ed="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="annotation subj
 ect"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="t
 rue"\n   Name="No List"/>\n  <w:LsdException Locked="false" SemiHidden="true
 " UnhideWhenUsed="true"\n   Name="Outline List 1"/>\n  <w:LsdException Locke
 d="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Outline List 2"/
 >\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\
 n   Name="Outline List 3"/>\n  <w:LsdException Locked="false" SemiHidden="tr
 ue" UnhideWhenUsed="true"\n   Name="Table Simple 1"/>\n  <w:LsdException Loc
 ked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Simple 2
 "/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true
 "\n   Name="Table Simple 3"/>\n  <w:LsdException Locked="false" SemiHidden="
 true" UnhideWhenUsed="true"\n   Name="Table Classic 1"/>\n  <w:LsdException 
 Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Class
 ic 2"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="
 true"\n   Name="Table Classic 3"/>\n  <w:LsdException Locked="false" SemiHid
 den="true" UnhideWhenUsed="true"\n   Name="Table Classic 4"/>\n  <w:LsdExcep
 tion Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table 
 Colorful 1"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhen
 Used="true"\n   Name="Table Colorful 2"/>\n  <w:LsdException Locked="false" 
 SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Colorful 3"/>\n  <w:
 LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name
 ="Table Columns 1"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unh
 ideWhenUsed="true"\n   Name="Table Columns 2"/>\n  <w:LsdException Locked="f
 alse" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Columns 3"/>\n
   <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n  
  Name="Table Columns 4"/>\n  <w:LsdException Locked="false" SemiHidden="true
 " UnhideWhenUsed="true"\n   Name="Table Columns 5"/>\n  <w:LsdException Lock
 ed="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Grid 1"/>
 \n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n
    Name="Table Grid 2"/>\n  <w:LsdException Locked="false" SemiHidden="true"
  UnhideWhenUsed="true"\n   Name="Table Grid 3"/>\n  <w:LsdException Locked="
 false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Grid 4"/>\n  
 <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   N
 ame="Table Grid 5"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unh
 ideWhenUsed="true"\n   Name="Table Grid 6"/>\n  <w:LsdException Locked="fals
 e" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Grid 7"/>\n  <w:L
 sdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name=
 "Table Grid 8"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideW
 henUsed="true"\n   Name="Table List 1"/>\n  <w:LsdException Locked="false" S
 emiHidden="true" UnhideWhenUsed="true"\n   Name="Table List 2"/>\n  <w:LsdEx
 ception Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Tab
 le List 3"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenU
 sed="true"\n   Name="Table List 4"/>\n  <w:LsdException Locked="false" SemiH
 idden="true" UnhideWhenUsed="true"\n   Name="Table List 5"/>\n  <w:LsdExcept
 ion Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table L
 ist 6"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed=
 "true"\n   Name="Table List 7"/>\n  <w:LsdException Locked="false" SemiHidde
 n="true" UnhideWhenUsed="true"\n   Name="Table List 8"/>\n  <w:LsdException 
 Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table 3D ef
 fects 1"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUse
 d="true"\n   Name="Table 3D effects 2"/>\n  <w:LsdException Locked="false" S
 emiHidden="true" UnhideWhenUsed="true"\n   Name="Table 3D effects 3"/>\n  <w
 :LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Nam
 e="Table Contemporary"/>\n  <w:LsdException Locked="false" SemiHidden="true"
  UnhideWhenUsed="true"\n   Name="Table Elegant"/>\n  <w:LsdException Locked=
 "false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Professional
 "/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true
 "\n   Name="Table Subtle 1"/>\n  <w:LsdException Locked="false" SemiHidden="
 true" UnhideWhenUsed="true"\n   Name="Table Subtle 2"/>\n  <w:LsdException L
 ocked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Table Web 1"
 />\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
 \n   Name="Table Web 2"/>\n  <w:LsdException Locked="false" SemiHidden="true
 " UnhideWhenUsed="true"\n   Name="Table Web 3"/>\n  <w:LsdException Locked="
 false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Balloon Text"/>\n  
 <w:LsdException Locked="false" Priority="39" Name="Table Grid"/>\n  <w:LsdEx
 ception Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Tab
 le Theme"/>\n  <w:LsdException Locked="false" SemiHidden="true" Name="Placeh
 older Text"/>\n  <w:LsdException Locked="false" Priority="1" QFormat="true" 
 Name="No Spacing"/>\n  <w:LsdException Locked="false" Priority="60" Name="Li
 ght Shading"/>\n  <w:LsdException Locked="false" Priority="61" Name="Light L
 ist"/>\n  <w:LsdException Locked="false" Priority="62" Name="Light Grid"/>\n
   <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>\n  
 <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>\n  <w
 :LsdException Locked="false" Priority="65" Name="Medium List 1"/>\n  <w:LsdE
 xception Locked="false" Priority="66" Name="Medium List 2"/>\n  <w:LsdExcept
 ion Locked="false" Priority="67" Name="Medium Grid 1"/>\n  <w:LsdException L
 ocked="false" Priority="68" Name="Medium Grid 2"/>\n  <w:LsdException Locked
 ="false" Priority="69" Name="Medium Grid 3"/>\n  <w:LsdException Locked="fal
 se" Priority="70" Name="Dark List"/>\n  <w:LsdException Locked="false" Prior
 ity="71" Name="Colorful Shading"/>\n  <w:LsdException Locked="false" Priorit
 y="72" Name="Colorful List"/>\n  <w:LsdException Locked="false" Priority="73
 " Name="Colorful Grid"/>\n  <w:LsdException Locked="false" Priority="60" Nam
 e="Light Shading Accent 1"/>\n  <w:LsdException Locked="false" Priority="61"
  Name="Light List Accent 1"/>\n  <w:LsdException Locked="false" Priority="62
 " Name="Light Grid Accent 1"/>\n  <w:LsdException Locked="false" Priority="6
 3" Name="Medium Shading 1 Accent 1"/>\n  <w:LsdException Locked="false" Prio
 rity="64" Name="Medium Shading 2 Accent 1"/>\n  <w:LsdException Locked="fals
 e" Priority="65" Name="Medium List 1 Accent 1"/>\n  <w:LsdException Locked="
 false" SemiHidden="true" Name="Revision"/>\n  <w:LsdException Locked="false"
  Priority="34" QFormat="true"\n   Name="List Paragraph"/>\n  <w:LsdException
  Locked="false" Priority="29" QFormat="true" Name="Quote"/>\n  <w:LsdExcepti
 on Locked="false" Priority="30" QFormat="true"\n   Name="Intense Quote"/>\n 
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/
 >\n  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent
  1"/>\n  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Ac
 cent 1"/>\n  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 
 3 Accent 1"/>\n  <w:LsdException Locked="false" Priority="70" Name="Dark Lis
 t Accent 1"/>\n  <w:LsdException Locked="false" Priority="71" Name="Colorful
  Shading Accent 1"/>\n  <w:LsdException Locked="false" Priority="72" Name="C
 olorful List Accent 1"/>\n  <w:LsdException Locked="false" Priority="73" Nam
 e="Colorful Grid Accent 1"/>\n  <w:LsdException Locked="false" Priority="60"
  Name="Light Shading Accent 2"/>\n  <w:LsdException Locked="false" Priority=
 "61" Name="Light List Accent 2"/>\n  <w:LsdException Locked="false" Priority
 ="62" Name="Light Grid Accent 2"/>\n  <w:LsdException Locked="false" Priorit
 y="63" Name="Medium Shading 1 Accent 2"/>\n  <w:LsdException Locked="false" 
 Priority="64" Name="Medium Shading 2 Accent 2"/>\n  <w:LsdException Locked="
 false" Priority="65" Name="Medium List 1 Accent 2"/>\n  <w:LsdException Lock
 ed="false" Priority="66" Name="Medium List 2 Accent 2"/>\n  <w:LsdException 
 Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>\n  <w:LsdExcept
 ion Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>\n  <w:LsdEx
 ception Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>\n  <w:L
 sdException Locked="false" Priority="70" Name="Dark List Accent 2"/>\n  <w:L
 sdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>\
 n  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2
 "/>\n  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Acce
 nt 2"/>\n  <w:LsdException Locked="false" Priority="60" Name="Light Shading 
 Accent 3"/>\n  <w:LsdException Locked="false" Priority="61" Name="Light List
  Accent 3"/>\n  <w:LsdException Locked="false" Priority="62" Name="Light Gri
 d Accent 3"/>\n  <w:LsdException Locked="false" Priority="63" Name="Medium S
 hading 1 Accent 3"/>\n  <w:LsdException Locked="false" Priority="64" Name="M
 edium Shading 2 Accent 3"/>\n  <w:LsdException Locked="false" Priority="65" 
 Name="Medium List 1 Accent 3"/>\n  <w:LsdException Locked="false" Priority="
 66" Name="Medium List 2 Accent 3"/>\n  <w:LsdException Locked="false" Priori
 ty="67" Name="Medium Grid 1 Accent 3"/>\n  <w:LsdException Locked="false" Pr
 iority="68" Name="Medium Grid 2 Accent 3"/>\n  <w:LsdException Locked="false
 " Priority="69" Name="Medium Grid 3 Accent 3"/>\n  <w:LsdException Locked="f
 alse" Priority="70" Name="Dark List Accent 3"/>\n  <w:LsdException Locked="f
 alse" Priority="71" Name="Colorful Shading Accent 3"/>\n  <w:LsdException Lo
 cked="false" Priority="72" Name="Colorful List Accent 3"/>\n  <w:LsdExceptio
 n Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>\n  <w:LsdExce
 ption Locked="false" Priority="60" Name="Light Shading Accent 4"/>\n  <w:Lsd
 Exception Locked="false" Priority="61" Name="Light List Accent 4"/>\n  <w:Ls
 dException Locked="false" Priority="62" Name="Light Grid Accent 4"/>\n  <w:L
 sdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>\
 n  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accen
 t 4"/>\n  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 A
 ccent 4"/>\n  <w:LsdException Locked="false" Priority="66" Name="Medium List
  2 Accent 4"/>\n  <w:LsdException Locked="false" Priority="67" Name="Medium 
 Grid 1 Accent 4"/>\n  <w:LsdException Locked="false" Priority="68" Name="Med
 ium Grid 2 Accent 4"/>\n  <w:LsdException Locked="false" Priority="69" Name=
 "Medium Grid 3 Accent 4"/>\n  <w:LsdException Locked="false" Priority="70" N
 ame="Dark List Accent 4"/>\n  <w:LsdException Locked="false" Priority="71" N
 ame="Colorful Shading Accent 4"/>\n  <w:LsdException Locked="false" Priority
 ="72" Name="Colorful List Accent 4"/>\n  <w:LsdException Locked="false" Prio
 rity="73" Name="Colorful Grid Accent 4"/>\n  <w:LsdException Locked="false" 
 Priority="60" Name="Light Shading Accent 5"/>\n  <w:LsdException Locked="fal
 se" Priority="61" Name="Light List Accent 5"/>\n  <w:LsdException Locked="fa
 lse" Priority="62" Name="Light Grid Accent 5"/>\n  <w:LsdException Locked="f
 alse" Priority="63" Name="Medium Shading 1 Accent 5"/>\n  <w:LsdException Lo
 cked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>\n  <w:LsdExcep
 tion Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>\n  <w:LsdE
 xception Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>\n  <w:
 LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>\n 
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/
 >\n  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent
  5"/>\n  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent
  5"/>\n  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading
  Accent 5"/>\n  <w:LsdException Locked="false" Priority="72" Name="Colorful 
 List Accent 5"/>\n  <w:LsdException Locked="false" Priority="73" Name="Color
 ful Grid Accent 5"/>\n  <w:LsdException Locked="false" Priority="60" Name="L
 ight Shading Accent 6"/>\n  <w:LsdException Locked="false" Priority="61" Nam
 e="Light List Accent 6"/>\n  <w:LsdException Locked="false" Priority="62" Na
 me="Light Grid Accent 6"/>\n  <w:LsdException Locked="false" Priority="63" N
 ame="Medium Shading 1 Accent 6"/>\n  <w:LsdException Locked="false" Priority
 ="64" Name="Medium Shading 2 Accent 6"/>\n  <w:LsdException Locked="false" P
 riority="65" Name="Medium List 1 Accent 6"/>\n  <w:LsdException Locked="fals
 e" Priority="66" Name="Medium List 2 Accent 6"/>\n  <w:LsdException Locked="
 false" Priority="67" Name="Medium Grid 1 Accent 6"/>\n  <w:LsdException Lock
 ed="false" Priority="68" Name="Medium Grid 2 Accent 6"/>\n  <w:LsdException 
 Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>\n  <w:LsdExcept
 ion Locked="false" Priority="70" Name="Dark List Accent 6"/>\n  <w:LsdExcept
 ion Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>\n  <w:Ls
 dException Locked="false" Priority="72" Name="Colorful List Accent 6"/>\n  <
 w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>\
 n  <w:LsdException Locked="false" Priority="19" QFormat="true"\n   Name="Sub
 tle Emphasis"/>\n  <w:LsdException Locked="false" Priority="21" QFormat="tru
 e"\n   Name="Intense Emphasis"/>\n  <w:LsdException Locked="false" Priority=
 "31" QFormat="true"\n   Name="Subtle Reference"/>\n  <w:LsdException Locked=
 "false" Priority="32" QFormat="true"\n   Name="Intense Reference"/>\n  <w:Ls
 dException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>\n
   <w:LsdException Locked="false" Priority="37" SemiHidden="true"\n   UnhideW
 henUsed="true" Name="Bibliography"/>\n  <w:LsdException Locked="false" Prior
 ity="39" SemiHidden="true"\n   UnhideWhenUsed="true" QFormat="true" Name="TO
 C Heading"/>\n  <w:LsdException Locked="false" Priority="41" Name="Plain Tab
 le 1"/>\n  <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"
 />\n  <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>\n 
  <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>\n  <w:L
 sdException Locked="false" Priority="45" Name="Plain Table 5"/>\n  <w:LsdExc
 eption Locked="false" Priority="40" Name="Grid Table Light"/>\n  <w:LsdExcep
 tion Locked="false" Priority="46" Name="Grid Table 1 Light"/>\n  <w:LsdExcep
 tion Locked="false" Priority="47" Name="Grid Table 2"/>\n  <w:LsdException L
 ocked="false" Priority="48" Name="Grid Table 3"/>\n  <w:LsdException Locked=
 "false" Priority="49" Name="Grid Table 4"/>\n  <w:LsdException Locked="false
 " Priority="50" Name="Grid Table 5 Dark"/>\n  <w:LsdException Locked="false"
  Priority="51" Name="Grid Table 6 Colorful"/>\n  <w:LsdException Locked="fal
 se" Priority="52" Name="Grid Table 7 Colorful"/>\n  <w:LsdException Locked="
 false" Priority="46"\n   Name="Grid Table 1 Light Accent 1"/>\n  <w:LsdExcep
 tion Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>\n  <w:LsdEx
 ception Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>\n  <w:Ls
 dException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>\n  <w
 :LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"
 />\n  <w:LsdException Locked="false" Priority="51"\n   Name="Grid Table 6 Co
 lorful Accent 1"/>\n  <w:LsdException Locked="false" Priority="52"\n   Name=
 "Grid Table 7 Colorful Accent 1"/>\n  <w:LsdException Locked="false" Priorit
 y="46"\n   Name="Grid Table 1 Light Accent 2"/>\n  <w:LsdException Locked="f
 alse" Priority="47" Name="Grid Table 2 Accent 2"/>\n  <w:LsdException Locked
 ="false" Priority="48" Name="Grid Table 3 Accent 2"/>\n  <w:LsdException Loc
 ked="false" Priority="49" Name="Grid Table 4 Accent 2"/>\n  <w:LsdException 
 Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>\n  <w:LsdEx
 ception Locked="false" Priority="51"\n   Name="Grid Table 6 Colorful Accent 
 2"/>\n  <w:LsdException Locked="false" Priority="52"\n   Name="Grid Table 7 
 Colorful Accent 2"/>\n  <w:LsdException Locked="false" Priority="46"\n   Nam
 e="Grid Table 1 Light Accent 3"/>\n  <w:LsdException Locked="false" Priority
 ="47" Name="Grid Table 2 Accent 3"/>\n  <w:LsdException Locked="false" Prior
 ity="48" Name="Grid Table 3 Accent 3"/>\n  <w:LsdException Locked="false" Pr
 iority="49" Name="Grid Table 4 Accent 3"/>\n  <w:LsdException Locked="false"
  Priority="50" Name="Grid Table 5 Dark Accent 3"/>\n  <w:LsdException Locked
 ="false" Priority="51"\n   Name="Grid Table 6 Colorful Accent 3"/>\n  <w:Lsd
 Exception Locked="false" Priority="52"\n   Name="Grid Table 7 Colorful Accen
 t 3"/>\n  <w:LsdException Locked="false" Priority="46"\n   Name="Grid Table 
 1 Light Accent 4"/>\n  <w:LsdException Locked="false" Priority="47" Name="Gr
 id Table 2 Accent 4"/>\n  <w:LsdException Locked="false" Priority="48" Name=
 "Grid Table 3 Accent 4"/>\n  <w:LsdException Locked="false" Priority="49" Na
 me="Grid Table 4 Accent 4"/>\n  <w:LsdException Locked="false" Priority="50"
  Name="Grid Table 5 Dark Accent 4"/>\n  <w:LsdException Locked="false" Prior
 ity="51"\n   Name="Grid Table 6 Colorful Accent 4"/>\n  <w:LsdException Lock
 ed="false" Priority="52"\n   Name="Grid Table 7 Colorful Accent 4"/>\n  <w:L
 sdException Locked="false" Priority="46"\n   Name="Grid Table 1 Light Accent
  5"/>\n  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Acc
 ent 5"/>\n  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 
 Accent 5"/>\n  <w:LsdException Locked="false" Priority="49" Name="Grid Table
  4 Accent 5"/>\n  <w:LsdException Locked="false" Priority="50" Name="Grid Ta
 ble 5 Dark Accent 5"/>\n  <w:LsdException Locked="false" Priority="51"\n   N
 ame="Grid Table 6 Colorful Accent 5"/>\n  <w:LsdException Locked="false" Pri
 ority="52"\n   Name="Grid Table 7 Colorful Accent 5"/>\n  <w:LsdException Lo
 cked="false" Priority="46"\n   Name="Grid Table 1 Light Accent 6"/>\n  <w:Ls
 dException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>\n  <w
 :LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>\n 
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
 \n  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Acc
 ent 6"/>\n  <w:LsdException Locked="false" Priority="51"\n   Name="Grid Tabl
 e 6 Colorful Accent 6"/>\n  <w:LsdException Locked="false" Priority="52"\n  
  Name="Grid Table 7 Colorful Accent 6"/>\n  <w:LsdException Locked="false" P
 riority="46" Name="List Table 1 Light"/>\n  <w:LsdException Locked="false" P
 riority="47" Name="List Table 2"/>\n  <w:LsdException Locked="false" Priorit
 y="48" Name="List Table 3"/>\n  <w:LsdException Locked="false" Priority="49"
  Name="List Table 4"/>\n  <w:LsdException Locked="false" Priority="50" Name=
 "List Table 5 Dark"/>\n  <w:LsdException Locked="false" Priority="51" Name="
 List Table 6 Colorful"/>\n  <w:LsdException Locked="false" Priority="52" Nam
 e="List Table 7 Colorful"/>\n  <w:LsdException Locked="false" Priority="46"\
 n   Name="List Table 1 Light Accent 1"/>\n  <w:LsdException Locked="false" P
 riority="47" Name="List Table 2 Accent 1"/>\n  <w:LsdException Locked="false
 " Priority="48" Name="List Table 3 Accent 1"/>\n  <w:LsdException Locked="fa
 lse" Priority="49" Name="List Table 4 Accent 1"/>\n  <w:LsdException Locked=
 "false" Priority="50" Name="List Table 5 Dark Accent 1"/>\n  <w:LsdException
  Locked="false" Priority="51"\n   Name="List Table 6 Colorful Accent 1"/>\n 
  <w:LsdException Locked="false" Priority="52"\n   Name="List Table 7 Colorfu
 l Accent 1"/>\n  <w:LsdException Locked="false" Priority="46"\n   Name="List
  Table 1 Light Accent 2"/>\n  <w:LsdException Locked="false" Priority="47" N
 ame="List Table 2 Accent 2"/>\n  <w:LsdException Locked="false" Priority="48
 " Name="List Table 3 Accent 2"/>\n  <w:LsdException Locked="false" Priority=
 "49" Name="List Table 4 Accent 2"/>\n  <w:LsdException Locked="false" Priori
 ty="50" Name="List Table 5 Dark Accent 2"/>\n  <w:LsdException Locked="false
 " Priority="51"\n   Name="List Table 6 Colorful Accent 2"/>\n  <w:LsdExcepti
 on Locked="false" Priority="52"\n   Name="List Table 7 Colorful Accent 2"/>\
 n  <w:LsdException Locked="false" Priority="46"\n   Name="List Table 1 Light
  Accent 3"/>\n  <w:LsdException Locked="false" Priority="47" Name="List Tabl
 e 2 Accent 3"/>\n  <w:LsdException Locked="false" Priority="48" Name="List T
 able 3 Accent 3"/>\n  <w:LsdException Locked="false" Priority="49" Name="Lis
 t Table 4 Accent 3"/>\n  <w:LsdException Locked="false" Priority="50" Name="
 List Table 5 Dark Accent 3"/>\n  <w:LsdException Locked="false" Priority="51
 "\n   Name="List Table 6 Colorful Accent 3"/>\n  <w:LsdException Locked="fal
 se" Priority="52"\n   Name="List Table 7 Colorful Accent 3"/>\n  <w:LsdExcep
 tion Locked="false" Priority="46"\n   Name="List Table 1 Light Accent 4"/>\n
   <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/
 >\n  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 
 4"/>\n  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Acce
 nt 4"/>\n  <w:LsdException Locked="false" Priority="50" Name="List Table 5 D
 ark Accent 4"/>\n  <w:LsdException Locked="false" Priority="51"\n   Name="Li
 st Table 6 Colorful Accent 4"/>\n  <w:LsdException Locked="false" Priority="
 52"\n   Name="List Table 7 Colorful Accent 4"/>\n  <w:LsdException Locked="f
 alse" Priority="46"\n   Name="List Table 1 Light Accent 5"/>\n  <w:LsdExcept
 ion Locked="false" Priority="47" Name="List Table 2 Accent 5"/>\n  <w:LsdExc
 eption Locked="false" Priority="48" Name="List Table 3 Accent 5"/>\n  <w:Lsd
 Exception Locked="false" Priority="49" Name="List Table 4 Accent 5"/>\n  <w:
 LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/
 >\n  <w:LsdException Locked="false" Priority="51"\n   Name="List Table 6 Col
 orful Accent 5"/>\n  <w:LsdException Locked="false" Priority="52"\n   Name="
 List Table 7 Colorful Accent 5"/>\n  <w:LsdException Locked="false" Priority
 ="46"\n   Name="List Table 1 Light Accent 6"/>\n  <w:LsdException Locked="fa
 lse" Priority="47" Name="List Table 2 Accent 6"/>\n  <w:LsdException Locked=
 "false" Priority="48" Name="List Table 3 Accent 6"/>\n  <w:LsdException Lock
 ed="false" Priority="49" Name="List Table 4 Accent 6"/>\n  <w:LsdException L
 ocked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>\n  <w:LsdExc
 eption Locked="false" Priority="51"\n   Name="List Table 6 Colorful Accent 6
 "/>\n  <w:LsdException Locked="false" Priority="52"\n   Name="List Table 7 C
 olorful Accent 6"/>\n  <w:LsdException Locked="false" SemiHidden="true" Unhi
 deWhenUsed="true"\n   Name="Mention"/>\n  <w:LsdException Locked="false" Sem
 iHidden="true" UnhideWhenUsed="true"\n   Name="Smart Hyperlink"/>\n  <w:LsdE
 xception Locked="false" SemiHidden="true" UnhideWhenUsed="true"\n   Name="Ha
 shtag"/>\n  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed=
 "true"\n   Name="Unresolved Mention"/>\n </w:LatentStyles>\n</xml><![endif]-
 -><!--[if gte mso 10]>\n<style>\n /* Style Definitions */\n table.MsoNormalT
 able\n	{mso-style-name:"Tableau Normal"\;\n	mso-tstyle-rowband-size:0\;\n	ms
 o-tstyle-colband-size:0\;\n	mso-style-noshow:yes\;\n	mso-style-priority:99\;
 \n	mso-style-parent:""\;\n	mso-padding-alt:0cm 5.4pt 0cm 5.4pt\;\n	mso-para-
 margin-top:0cm\;\n	mso-para-margin-right:0cm\;\n	mso-para-margin-bottom:8.0p
 t\;\n	mso-para-margin-left:0cm\;\n	line-height:107%\;\n	mso-pagination:widow
 -orphan\;\n	font-size:11.0pt\;\n	font-family:"Calibri"\,sans-serif\;\n	mso-a
 scii-font-family:Calibri\;\n	mso-ascii-theme-font:minor-latin\;\n	mso-hansi-
 font-family:Calibri\;\n	mso-hansi-theme-font:minor-latin\;\n	mso-bidi-font-f
 amily:"Times New Roman"\;\n	mso-bidi-theme-font:minor-bidi\;\n	mso-fareast-l
 anguage:EN-US\;}\n</style>\n<![endif]--></div></div></body></html>
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ORGANIZER;SENT-BY="mailto:fabienne.rodionoff@imt-atlantique.fr":mailto:cyber
 cni@imt-atlantique.fr
X-MS-OLK-SENDER:mailto:fabienne.rodionoff@imt-atlantique.fr
DTSTART;TZID="Europe/Brussels":20221116T090000
DTEND;TZID="Europe/Brussels":20221116T120000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20220926T083321Z
DTSTAMP:20220926T083321Z
SEQUENCE:0
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER;RELATED=START:-PT15M
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
BEGIN:VEVENT
UID:9b155f38-0890-40ea-af37-fc5933c5611f
SUMMARY:ECW 2022 : démos de la chaire sur le stand d'Airbus
DESCRIPTION:\n
X-ALT-DESC;FMTTYPE=text/html:<html><body id='htmlmode'></body></html>
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ORGANIZER;SENT-BY="mailto:fabienne.rodionoff@imt-atlantique.fr":mailto:cyber
 cni@imt-atlantique.fr
X-MS-OLK-SENDER:mailto:fabienne.rodionoff@imt-atlantique.fr
DTSTART;TZID="Europe/Brussels":20221115T090000
DTEND;TZID="Europe/Brussels":20221117T170000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20220926T083448Z
DTSTAMP:20220926T083448Z
SEQUENCE:0
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER;RELATED=START:-PT15M
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
BEGIN:VEVENT
UID:F1B5A22E-32EC-445D-961C-A4AC92972D4F
SUMMARY:[talk.cybercni.fr] Gabi Dreo (Universität der Bundeswehr) - Paradigm
  shift from cybersecurity to cyber resilience
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 14h-15h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20221107T100000
DTEND;TZID="Europe/Paris":20221107T113000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20221019T194928Z
DTSTAMP:20221005T123113Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:DE838012-D43E-4AFD-AD4F-F6BC9CE6C95F
SUMMARY:[talk.cybercni.fr] Christian Hesselman (Siden Labs) - T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 14h-15h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20221207T140000
DTEND;TZID="Europe/Paris":20221207T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20221006T092040Z
DTSTAMP:20221005T123156Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:EF870267-9B78-4168-9C68-4A0D93FD3AD0
SUMMARY:[talk.cybercni.fr] Roland van Rijswijk-Deij (Professor of Network Se
 curity at University of Twente\, Principal Scientist at NLnet Labs) - Quantu
 m Prooving the Internet
DESCRIPTION:23.11.2022 Roland van Rijswijk-Deij (Professor of Network Securi
 ty at University of Twente\, Principal Scientist at NLnet Labs) - Quantum Pr
 ooving the Internet\n\n## Title\nQuantum Prooving the Internet\n\n## Abstrac
 t\nToday’s Internet cannot do without confidentiality and online identificat
 ion. The cryptography typically used to achieve this\, however\, is under th
 reat from quantum computers. While a practical quantum computer is years awa
 y\, it also takes years to standardise and deploy alternative cryptography. 
 Worse\, applications that store data long‐term (e.g.\, captured encrypted In
 ternet traffic) require action now\, since if current cryptography is broken
 \, stored data is immediately compromised.\n\nCryptographers are developing 
 post‐quantum cryptography (PQC) that is secure against attacks with quantum 
 computers. While much progress has been made developing and trialling algori
 thms\, we lack a complete view of the problem space. More boldly: we cannot 
 answer the question “what if the whole Internet had to switch to PQC?”. Nobo
 dy “owns the Internet” so who will tackle this challenge? Sure\, the tech gi
 ants should take action\, but the Internet is much broader than that. In my 
 view\, this challenge can only be solved with an independent holistic approa
 ch that considers all aspects of the Internet.\n\nIn this talk I will explor
 e the research challenges for quantum-proofing the whole Internet and will p
 ropose a research agenda to tackle these challenges. I will show how we need
  to examine all parts of the Internet that rely on public-key cryptography a
 nd how we need to decide if we can simply replace algorithms\, if we maybe h
 ave to re-engineer protocols and applications\, or if the costs are simply t
 oo high and we should retire protocols or applications.\n\n## Short CV\n\nAf
 ter two decades in the industry\, working on applied cryptography and networ
 k security\, Roland is professor of measurement-based Internet security at t
 he University of Twente since 2021. His research interests are in the applic
 ation of global-scale Internet measurements to support empirically-backed se
 curityanalysis and improvements of Internet protocols and the transition of 
 the Internet to post-quantum cryptography.\n\n## Info about your institution
 \n\nRoland is a member of the Design and Analysis of Communications Systems 
 group at the University of Twente\, and a researcher in the Twente Universit
 y Centre for Cybersecurity Research (TUCCR). Roland also advises NLnet Labs\
 , a not-for-profit that develops open source software for core Internet prot
 ocols\, on scientific research.\n\nProtecting against cyber risks is the dom
 ain of Cybersecurity. The Cyber CNI Speaker series wants to raise awareness 
 and understanding of cybersecurity topics. It wants to enable a continuous d
 ialog between experts from industry and academia and the general public\, in
 cluding individuals\, families\, companies from small to large sizes\, and p
 ublic bodies – in short everyone\, since cybersecurity is relevant for each 
 of us.\n\nThe Cyber CNI speaker series is a free monthly event on the last W
 ednesday of the month from 17h-18h30. The event consists of an expert talk o
 f about 40 minutes followed by 30 minutes discussion.\n\nThe events happen i
 n the Grand Amphitheatre at IMT Atlantique in Rennes (Cesson-Sévigné) AND ar
 e broadcasted live over Youtube (https://talk.cybercni.fr/)\, enabling globa
 l remote participation and including a tool for participating in the discuss
 ion.\nYou are cordially invited to participate. Please safe the dates and su
 bscribe to receive email notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20221123T140000
DTEND;TZID="Europe/Paris":20221123T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20221006T091533Z
DTSTAMP:20221006T091447Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
RRULE:FREQ=MONTHLY;UNTIL=20230222T155959Z;INTERVAL=1;BYDAY=-1WE
EXDATE;TZID="Europe/Paris":20220831T170000
EXDATE;TZID="Europe/Paris":20220629T170000
EXDATE;TZID="Europe/Paris":20210825T170000
EXDATE;TZID="Europe/Paris":20221228T170000
EXDATE;TZID="Europe/Paris":20210728T170000
EXDATE;TZID="Europe/Paris":20221130T170000
SUMMARY:[talk.cybercni.fr] Details will follow...
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20210728T170000
DTEND;TZID="Europe/Paris":20210728T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20210723T102735Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Sebastian Labitzke\, Jens Koehler (ITK Engineerin
 g\, DE)\, “Cybersecurty risk analysis”
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20211027T170000
DTEND;TZID="Europe/Paris":20211027T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20211027T170000
LAST-MODIFIED:20210723T214051Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Julien Nocetti (Académie militaire de Saint-Cyr\,
  Titulaire de la Chaire Gouvernance du risque cyber\, Rennes School of Busin
 ess) – T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220525T170000
DTEND;TZID="Europe/Paris":20220525T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220525T170000
LAST-MODIFIED:20211213T210526Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Mohammad Hamad (TU Munich\, DE)\, Multilayer Cybe
 rsecurity Framework for IoV - Needs\, Requirements\, and Solutions
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20211124T170000
DTEND;TZID="Europe/Paris":20211124T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20211124T170000
LAST-MODIFIED:20210723T223040Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Soumya Banerjee\, TRASNA - Latice-based crypto an
 d side-channel attacks
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220223T170000
DTEND;TZID="Europe/Paris":20220223T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220223T170000
LAST-MODIFIED:20211030T150126Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Cora Lisa Perner (Airbus) – Security for ground a
 nd air vehicles
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220427T170000
DTEND;TZID="Europe/Paris":20220427T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220427T170000
LAST-MODIFIED:20211213T210421Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Carol Fung (T.B.A.) – T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220126T170000
DTEND;TZID="Europe/Paris":20220126T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220126T170000
LAST-MODIFIED:20211213T210041Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Ayoub SABBAR\, ORNISEC - How to implement an effe
 ctive cybersecurity awareness program within organizations
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220330T170000
DTEND;TZID="Europe/Paris":20220330T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220330T170000
LAST-MODIFIED:20211030T150226Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Aaron Ding (TU Delft) – Trustworthy and Sustainab
 le Edge AI
DESCRIPTION:## Title \nTrustworthy and Sustainable Edge AI\n\n## Abstract \n
 Despite of promising impact\, Edge AI is facing two major challenges for its
  large scale deployment: trustworthiness and sustainability.\n\nOn trustwort
 hiness\, Edge AI benefits from its close proximity to the end-devices and us
 er generated data. However\, due to the distributed deployment and deep pene
 tration into personal context\, the safety and perceived trustworthiness for
  Edge AI services raise concerns among several stakeholders (e.g.\, end user
 s\, public sectors\, ISP). To achieve trustworthy Edge AI\, critical buildin
 g blocks are needed for ensuring transparency\, fairness and robustness\, es
 pecially for its training and deployment in decentralized\, uncontrolled env
 ironments. The trustworthiness of Edge AI is a stepping stone\, on which the
  promise of Edge AI can be built.\n\nMeanwhile\, being a critical goal of su
 stainability\, the energy consumption of Edge AI needs to be optimized. The 
 energy efficiency is crucial for embedding Edge AI to our infrastructures (e
 .g.\, road side units\, micro base stations) in order to sustainably support
  advanced autonomous driving and Extended Reality (XR) services in the years
  to come. Across the pipeline of data acquisition\, transfer\, computation\,
  and storage\, there exists the possibility for Edge AI to trade off accurac
 y to less power and less time consumed. For instance\, noisy inputs from num
 erous sensors can be selectively processed and transferred in order to save 
 energy. This new dimension to the optimization design can pave the way towar
 ds a sustainable deployment of Edge AI.\n\n## Aaron Ding \nAaron Ding is lea
 ding the Cyber-Physical Intelligence (CPI) Lab as tenured Associate Professo
 r of Edge AI at TU Delft. He has been awarded EU research grants (€5M+) as C
 onsortium Director and PI. With over 15 years of R&D experience across EU\, 
 UK and USA\, he has worked at TU Munich with Jörg Ott\, at Columbia Universi
 ty with Henning Schulzrinne\, at University of Cambridge with Jon Crowcroft.
  His research focuses on edge computing\, edge AI\, and data-driven IoT serv
 ices. Being an active member of ACM\, IEEE and IETF\, he is the founder of A
 CM EdgeSys\, Associate Editor for ACM TIOT and IEEE OJ-ITS. For contribution
 s to mobile edge computing\, his research has received best paper awards and
  recognition from ACM SIGCOMM\, ACM EdgeSys\, ACM SenSys CCIoT\, and IEEE IN
 FOCOM. Details of his projects and publications can be found on site: https:
 //homepage.tudelft.nl/8e79t/\n\n## TU Delft\nFounded in 1842\, Delft Univers
 ity of Technology (TU Delft) is the oldest\, largest\, and most comprehensiv
 e university of technology in the Netherlands and globally ranked top 10 on 
 the 2022 QS World University Rankings of Engineering & Technology. TU Delft 
 collaborates with a wide network of educational\, industrial\, and governmen
 tal partners. It is a member of university federations including the IDEA Le
 ague\, CESAER\, UNITECH International and 4TU.\n\nProtecting against cyber r
 isks is the domain of Cybersecurity. The Cyber CNI Speaker series wants to r
 aise awareness and understanding of cybersecurity topics. It wants to enable
  a continuous dialog between experts from industry and academia and the gene
 ral public\, including individuals\, families\, companies from small to larg
 e sizes\, and public bodies – in short everyone\, since cybersecurity is rel
 evant for each of us.\n\nThe Cyber CNI speaker series is a free monthly even
 t on the last Wednesday of the month from 17h-18h30. The event consists of a
 n expert talk of about 40 minutes followed by 30 minutes discussion.\n\nThe 
 events happen in the Grand Amphitheatre at IMT Atlantique in Rennes (Cesson-
 Sévigné) AND are broadcasted live over Youtube (https://talk.cybercni.fr/)\,
  enabling global remote participation and including a tool for participating
  in the discussion.\nYou are cordially invited to participate. Please safe t
 he dates and subscribe to receive email notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20221026T140000
DTEND;TZID="Europe/Paris":20221026T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20221026T170000
LAST-MODIFIED:20221023T200626Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Oliver Hohlfeld (TU Brandenburg\, DE)\, DDoS Atta
 cks and Booter Services
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20211215T170000
DTEND;TZID="Europe/Paris":20211215T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20211229T170000
LAST-MODIFIED:20210723T214217Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Details will follow...
DESCRIPTION:More details at: https://talk.cybercni.fr/\n\nProtecting against
  cyber risks is the domain of Cybersecurity. The Cyber CNI Speaker series wa
 nts to raise awareness and understanding of cybersecurity topics. It wants t
 o enable a continuous dialog between experts from industry and academia and 
 the general public\, including individuals\, families\, companies from small
  to large sizes\, and public bodies – in short everyone\, since cybersecurit
 y is relevant for each of us.\n\nThe Cyber CNI speaker series is a free mont
 hly event on the last Wednesday of the month from 14h-15h30. The event consi
 sts of an expert talk of about 40 minutes followed by 30 minutes discussion.
 \n\nThe events happen in the Grand Amphitheatre at IMT Atlantique in Rennes 
 (Cesson-Sévigné) AND are broadcasted live over Youtube (https://talk.cybercn
 i.fr/)\, enabling global remote participation and including a tool for parti
 cipating in the discussion.\nYou are cordially invited to participate. Pleas
 e safe the dates and subscribe to receive email notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230125T140000
DTEND;TZID="Europe/Paris":20230125T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20230125T170000
LAST-MODIFIED:20230209T105047Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Julie Newton et al. (European Cyberschool\, FR)\,
  Cybersecurity education – more important than ever!
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20210929T170000
DTEND;TZID="Europe/Paris":20210929T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20210929T170000
LAST-MODIFIED:20210723T214032Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Philipp Drieger (Principal Machine Learning Archi
 tect\, Splunk) - T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220727T140000
DTEND;TZID="Europe/Paris":20220727T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220727T170000
LAST-MODIFIED:20220725T095533Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AF8AD23F-8309-4CD4-A6D0-D82A1FD9E7D7
SUMMARY:[talk.cybercni.fr] Roland van Rijswijk-Deij (utwente.nl) – T.B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20220928T170000
DTEND;TZID="Europe/Paris":20220928T183000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20220928T170000
LAST-MODIFIED:20211213T210727Z
DTSTAMP:20230209T105314Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
RRULE:FREQ=MONTHLY;UNTIL=20260122T130000Z;INTERVAL=1;BYDAY=-1FR
EXDATE;TZID="Europe/Paris":20240329T140000
EXDATE;TZID="Europe/Paris":20251128T140000
EXDATE;TZID="Europe/Paris":20250926T140000
EXDATE;TZID="Europe/Paris":20240531T140000
EXDATE;TZID="Europe/Paris":20250725T140000
EXDATE;TZID="Europe/Paris":20250425T140000
EXDATE;TZID="Europe/Paris":20250829T140000
EXDATE;TZID="Europe/Paris":20251031T140000
EXDATE;TZID="Europe/Paris":20250530T140000
EXDATE;TZID="Europe/Paris":20241227T140000
SUMMARY:[talk.cybercni.fr] Details will follow...
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20240329T140000
DTEND;TZID="Europe/Paris":20240329T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20240214T083734Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] T.B.A.\, Shareeful Islam (Anglia Ruskin Universit
 y\, UK)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20240726T140000
DTEND;TZID="Europe/Paris":20240726T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20240726T140000
LAST-MODIFIED:20240711T155815Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] Details will follow...
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20250704T140000
DTEND;TZID="Europe/Paris":20250704T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20250627T140000
LAST-MODIFIED:20250627T091944Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] T.B.A.\, Ralph Holz (Universität Münster)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20241025T140000
DTEND;TZID="Europe/Paris":20241025T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20241025T140000
LAST-MODIFIED:20240221T215543Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr]  T.B.A.\, Pascal Lafourcade (Université Clermont 
 Auvergne)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20240830T130000
DTEND;TZID="Europe/Paris":20240830T143000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20240830T140000
LAST-MODIFIED:20240724T130227Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] Christian A. Mohr\, (Tergau & Walkenhorst Patent 
 Attorneys)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20250307T140000
DTEND;TZID="Europe/Paris":20250307T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20250228T140000
LAST-MODIFIED:20250206T100027Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] T.B.A. TinyPART - Tiny\, private\, proved & isola
 ted IoT\, Orange\, INRIA
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20241129T140000
DTEND;TZID="Europe/Paris":20241129T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20241129T140000
LAST-MODIFIED:20240513T130933Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] Global challenges and holistic legal approaches i
 n cyber resilience\, Prof. Dr. Dennis-Kenji Kipker (Research Director cyberi
 ntelligence.institute)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20240517T143000
DTEND;TZID="Europe/Paris":20240517T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20240426T140000
LAST-MODIFIED:20240515T124424Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] Friday\, 27.09.2024\, 2pm CET\, T.B.A.\, Valeria 
 Loscri (Inria Lille-Nord Europe)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20240927T140000
DTEND;TZID="Europe/Paris":20240927T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20240927T140000
LAST-MODIFIED:20240225T153957Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:810A1114-94B8-42A2-AB8C-FE1A4361F25E
SUMMARY:[talk.cybercni.fr] The Sixth Sense for AI Algorithms: Challenges on 
 Confidentiality\, Trust and Security for Mobile Device\, Dr. Soumya Banerjee
 \, (Trasna-Solutions Ltd.)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20250131T140000
DTEND;TZID="Europe/Paris":20250131T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20250131T140000
LAST-MODIFIED:20250124T133716Z
DTSTAMP:20210723T102627Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:0F6D0AFA-232D-4F63-A287-6E233863B51A
SUMMARY:[TALK29] 22.03.2023 Claire Levallois-Barth\, Chaire VP-IP Valeurs et
  Politiques des Informations Personnelles\, Un portefeuille européen d’ident
 ité numérique pour tous les citoyens et résidents de l’UE : apports\, risque
 s et garanties
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230322T140000
DTEND;TZID="Europe/Paris":20230322T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230220T140124Z
DTSTAMP:20230220T140032Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:B5BA45BD-B7FE-4976-88F2-B5A024066BCD
SUMMARY:[TALK28] 22.02.2023 Frédérick Benaben\, IMT Mines Albi\, Georgia Ins
 titute of Technology\, “Virtual Reality-based Risk Analysis”
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230222T140000
DTEND;TZID="Europe/Paris":20230222T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230220T140107Z
DTSTAMP:20230220T140044Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:41ACB941-FD89-4B03-A378-511AD85B4662
SUMMARY:[TALK29] T.B.D
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!\n\n----( Video Call )----\nhttps://talk.cybercni.fr/28\n---
 ===---
LOCATION:https://talk.cybercni.fr/28
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Belgrade":20230322T140000
DTEND;TZID="Europe/Belgrade":20230322T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230227T101536Z
DTSTAMP:20230227T101516Z
SEQUENCE:6
END:VEVENT
BEGIN:VEVENT
UID:d4d268f4-3aa8-45db-9032-44927cc7f427
SUMMARY:BDC Mexico pour Thibault
ORGANIZER;SENT-BY="mailto:sandrine.frouin@imt-atlantique.fr":mailto:cybercni
 @imt-atlantique.fr
X-MS-OLK-SENDER:mailto:sandrine.frouin@imt-atlantique.fr
DTSTART;TZID="Europe/Brussels":20230321T090000
DTEND;TZID="Europe/Brussels":20230321T093000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230320T163833Z
DTSTAMP:20230320T163833Z
SEQUENCE:0
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER;RELATED=START:-PT15M
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
BEGIN:VEVENT
UID:1B875105-C87F-4CEF-9427-CDD3B9D0CE1B
SUMMARY:[talk.cybercni.fr 30] Pierre Parrend\, University of Strasbourg\, T.
 B.A.
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;SENT-BY="mailto:fabienne.rodionoff@imt-atlantique.fr":mailto:cyber
 cni@imt-atlantique.fr
X-MS-OLK-SENDER:mailto:fabienne.rodionoff@imt-atlantique.fr
DTSTART;TZID="Europe/Belgrade":20230419T140000
DTEND;TZID="Europe/Belgrade":20230419T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230323T091811Z
DTSTAMP:20230323T091811Z
SEQUENCE:3
END:VEVENT
BEGIN:VEVENT
UID:54F8A106-D48C-4082-8E58-6F85C34B3D74
SUMMARY:[FIC2023] "Le Métaverse - Risque ou chance : Perspective de la cyber
 sécurité\," Marc-Oliver Pahl
LOCATION:FIC2023\, Lille\, Stand du CNRS\, Forum International de la Cybersé
 curité\, Palais de congrès\, Lille
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230405T163000
DTEND;TZID="Europe/Paris":20230405T170000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230404T103844Z
DTSTAMP:20230330T085608Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:6ED0D6E7-D82D-456C-BA6A-793CF7C386E9
SUMMARY:[FIC2023] Protection des infrastructures critiques : un sujet au cœu
 r de l’actualité
DESCRIPTION:As in the past years\, the chaire cyberCNI.fr will have a strong
  presence at the Forum International de la Cybersécurité (FIC 2023) in the G
 rand Palais at Lille. The goal of the chair is showcasing its works for attr
 acting 2-3 additional industry partners.\n\nWe cordially invite you to meet 
 us at:\n\n5.4.2023 16h30\, Area of the Masterclasses and Research Presentati
 ons of the CNRS\nMarc-Oliver Pahl\, “The Metaverse – Risk or Chance: a Cyber
 security Perspective”\n6.4.2023 14h00\, Pavillon de la Région Bretagne F23\,
  “Protection des infrastructures critiques : un sujet au cœur de l’actualité
 ”\nAbout the FIC\nThe International Cybersecurity Forum is Europe’s leading 
 event on digital security and trust issues.\n\nIts unique feature is to brin
 g together the entire cybersecurity and “trusted digital” ecosystem: end cus
 tomers\, service providers\, solution providers\, consultants\, law enforcem
 ent and government agencies\, schools and universities…\n\nIts mission is to
  respond to a double urgency :\n\nTo face the operational challenges of cybe
 rsecurity \nTo contribute to the construction of a digital future in line wi
 th European values and interests\nThe FIC is at the same time:\n\nAn exhibit
 ion dedicated to meetings between end customers and solution and service pro
 viders\nA forum for exchange and reflection on the operational and strategic
  challenges of cybersecurity\nAbout the chair Cybersecurity of Critical Netw
 orked Infrastructures (cyberCNI.fr)\nThe Cyber CNI Chair at IMT Atlantique d
 oes research\, innovation\, and teaching in the field of cybersecurity for c
 ritical networked infrastructures. Such infrastructures include industrial p
 rocesses\, financial systems\, building automation\, energy networks\, water
  treatment plants\, or transportation.\n\nThe chair covers the full stack fr
 om sensors and actuators and their signals over industrial control systems\,
  distributed services at the edge or cloud\, to user interfaces with collabo
 rative Mixed Reality\, and security policies. The chair currently hosts 9 Ph
 D students\, 4 PostDocs\, 11 Professors\, 1 engineer\, and 1 internship stud
 ent.\n\nThe chair runs a large testbed that enables applied research togethe
 r with the industry partners. The industry partners of the current third fun
 ding round are Airbus\, BNP Paribas\, EDF\, and SNCF. The chaire is located 
 in Brittany\, France. Brittany is the cybersecurity region number 1 in Franc
 e. The chair Cyber CNI is strongly embedded in the cybersecurity ecosystem t
 hrough its partnerships with the Pôle d’Excellence Cyber (PEC) and the Britt
 any Region.
LOCATION:FIC2023\, Lille\, Pavillon de la Région Bretagne F23
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230406T140000
DTEND;TZID="Europe/Paris":20230406T150000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230404T103832Z
DTSTAMP:20230404T103607Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:D0AB0AD1-51AC-4CB6-9D46-AA91076DECFD
SUMMARY:ECW 2023 : [fix] Session Chaire cyberCNI + CyberNaval
DESCRIPTION:Dear all\, \n\nit is clear now when our ECW will be. \n\nTherefo
 re I send you this blocker. \n\nIdeally you participate on-site. Probably we
  will do some presentations around use cases that we discuss / co-create at 
 the next Research Update (9.11.) and before. More info to follow.\n\nIn the 
 afternoon we plan to have a joint session with you as well (non-public). In 
 addition we will have demos at our booth every day at 12h30 and 15h30.\n\nBe
 st\, Marc-Oliver
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:christophe.lerouge@imt-atlantique.fr
ATTENDEE;CN=Christophe LEROUGE <christophe.lerouge@imt-atlantique.fr>;CUTYPE
 =INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE:mailto:Chri
 stophe%20LEROUGE%20%3Cchristophe.lerouge@imt-atlantique.fr%3E
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-coop@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-staff@imt-atlantique.fr
ATTENDEE;CN="Géraldine TEXIER";CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTST
 AT=NEEDS-ACTION;RSVP=TRUE:mailto:geraldine.texier@imt-atlantique.fr
ATTENDEE;CN=cybercni-copil;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=N
 EEDS-ACTION;RSVP=TRUE:mailto:cybercni-copil@imt-atlantique.fr
ATTENDEE;CN=Awaleh HOUSSEIN MERANEH;PARTSTAT=ACCEPTED:mailto:awaleh.houssein
 -meraneh@imt-atlantique.fr
ATTENDEE;CN=Fabien AUTREL;PARTSTAT=ACCEPTED:mailto:fabien.autrel@imt-atlanti
 que.fr
ATTENDEE;CN="Loïc Miller";CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:loic.mi
 ller@imt-atlantique.fr
ATTENDEE;CN=Hassan Chaitou;PARTSTAT=DECLINED:mailto:hassan.chaitou@telecom-p
 aris.fr
ATTENDEE;CN=Laurence LE COQ;PARTSTAT=DECLINED:mailto:laurence.le-coq@imt-atl
 antique.fr
ATTENDEE;CN=Sylvain Lamblot;SENT-BY="mailto:rmferry@enst.fr";PARTSTAT=DECLIN
 ED:mailto:sylvain.lamblot@telecom-paris.fr
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20231123T090000
DTEND;TZID="Europe/Paris":20231123T120000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230918T182842Z
DTSTAMP:20230918T182451Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:E01F9A09-112A-4428-8EA1-2928A4D877A0
SUMMARY:ECW 2023 : Chair internal session at the ECW (confirmed VIP lounge)
DESCRIPTION:In the afternoon we may have a joint sessoin with you (chair-int
 ernal). Again a blocker.
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-coop@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-staff@imt-atlantique.fr
ATTENDEE;CN=Awaleh HOUSSEIN MERANEH;CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mail
 to:awaleh.houssein-meraneh@imt-atlantique.fr
ATTENDEE;CN=Christophe LEROUGE <christophe.lerouge@imt-atlantique.fr>;CUTYPE
 =INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE:mailto:Chri
 stophe%20LEROUGE%20%3Cchristophe.lerouge@imt-atlantique.fr%3E
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:christophe.lerouge@imt-atlantique.fr
ATTENDEE;CN=Fabien AUTREL;CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:fabien.
 autrel@imt-atlantique.fr
ATTENDEE;CN="Géraldine TEXIER";CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTST
 AT=NEEDS-ACTION;RSVP=TRUE:mailto:geraldine.texier@imt-atlantique.fr
ATTENDEE;CN=Hassan Chaitou;CUTYPE=INDIVIDUAL;PARTSTAT=DECLINED:mailto:hassan
 .chaitou@telecom-paris.fr
ATTENDEE;CN="Loïc Miller";CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:loic.mi
 ller@imt-atlantique.fr
ATTENDEE;CN=Nisrine IBADAH;CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:nisrin
 e.ibadah@imt-atlantique.fr
ATTENDEE;CN=cybercni-copil;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=N
 EEDS-ACTION;RSVP=TRUE:mailto:cybercni-copil@imt-atlantique.fr
ATTENDEE;CN=Laurence LE COQ;PARTSTAT=DECLINED:mailto:laurence.le-coq@imt-atl
 antique.fr
ATTENDEE;CN=Thomas Robert;PARTSTAT=ACCEPTED:mailto:thomas.robert@telecom-par
 is.fr
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20231123T140000
DTEND;TZID="Europe/Paris":20231123T160000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20231002T073530Z
DTSTAMP:20230918T182938Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:330E4592-21D9-4276-9D56-002839E0A072
RRULE:FREQ=DAILY;COUNT=3;INTERVAL=1
SUMMARY:ECW 2023 : [fix] Présentation thématique phare at chaire cyberCNI.fr
  booth 45
DESCRIPTION:The preliminary plan is to have two présentations thématique pha
 re  per day at our stand:\n\n- 2 présentations phares sur le stand chaque jo
 ur à 12h30 et 15h30 pendant 30 minutes chacune par nos membres (PhD\, PostDo
 c)\n    - Léo: trust in federated ML\n    - Loic: Distributed Ledgers for Cy
 bersecurity\n    - Awaleh: Improving anomaly detection with side-channels\n 
    - Nisrine: Over the air updates for critical mobile infrastructures\n    
 - Nicolas: Immersive analytics for improved situational awareness\n    - Mat
 his: Observing attacks in real-time\n    - Luis: TR retour dans une semaine\
 n    - Zeinab:
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ATTENDEE;CN=Awaleh HOUSSEIN MERANEH;CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mail
 to:awaleh.houssein-meraneh@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:christophe.lerouge@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-coop@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-staff@imt-atlantique.fr
ATTENDEE;CN=Christophe LEROUGE <christophe.lerouge@imt-atlantique.fr>;CUTYPE
 =INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE:mailto:Chri
 stophe%20LEROUGE%20%3Cchristophe.lerouge@imt-atlantique.fr%3E
ATTENDEE;CN="Géraldine TEXIER";CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTST
 AT=NEEDS-ACTION;RSVP=TRUE:mailto:geraldine.texier@imt-atlantique.fr
ATTENDEE;CN=cybercni-copil;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=N
 EEDS-ACTION;RSVP=TRUE:mailto:cybercni-copil@imt-atlantique.fr
ATTENDEE;CN="Loïc Miller";CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:loic.mi
 ller@imt-atlantique.fr
ATTENDEE;CN=Hassan Chaitou;PARTSTAT=DECLINED:mailto:hassan.chaitou@telecom-p
 aris.fr
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20231121T123000
DTEND;TZID="Europe/Paris":20231121T130000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230919T080146Z
DTSTAMP:20230918T183504Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:5DC9A922-8CBF-41F9-92DA-D8070672C577
RRULE:FREQ=DAILY;COUNT=3;INTERVAL=1
SUMMARY:ECW 2023 : [fix] Présentation thématique phare at chaire cyberCNI.fr
  booth 45
DESCRIPTION:The preliminary plan is to have two Présentations thématique pha
 re per day at our stand:\n\n- 2 présentations phares sur le stand chaque jou
 r à 12h30 et 15h30 pendant 30 minutes chacune par nos membres (PhD\, PostDoc
 )\n    - Léo: trust in federated ML\n    - Loic: Distributed Ledgers for Cyb
 ersecurity\n    - Awaleh: Improving anomaly detection with side-channels\n  
   - Nisrine: Over the air updates for critical mobile infrastructures\n    -
  Nicolas: Immersive analytics for improved situational awareness\n    - Math
 is: Observing attacks in real-time\n    - Luis: TR retour dans une semaine\n
     - Zeinab:
LOCATION:Couvent des Jacobins - 20\, Place Saint-Anne\, 35000 Rennes
ATTENDEE;CN=Awaleh HOUSSEIN MERANEH;CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mail
 to:awaleh.houssein-meraneh@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:christophe.lerouge@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-coop@imt-atlantique.fr
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:cybercni-staff@imt-atlantique.fr
ATTENDEE;CN=Christophe LEROUGE <christophe.lerouge@imt-atlantique.fr>;CUTYPE
 =INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE:mailto:Chri
 stophe%20LEROUGE%20%3Cchristophe.lerouge@imt-atlantique.fr%3E
ATTENDEE;CN=Fabien AUTREL;CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:fabien.
 autrel@imt-atlantique.fr
ATTENDEE;CN="Géraldine TEXIER";CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTST
 AT=NEEDS-ACTION;RSVP=TRUE:mailto:geraldine.texier@imt-atlantique.fr
ATTENDEE;CN=cybercni-copil;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=N
 EEDS-ACTION;RSVP=TRUE:mailto:cybercni-copil@imt-atlantique.fr
ATTENDEE;CN="Loïc Miller";CUTYPE=INDIVIDUAL;PARTSTAT=ACCEPTED:mailto:loic.mi
 ller@imt-atlantique.fr
ATTENDEE;CN=Hassan Chaitou;PARTSTAT=DECLINED:mailto:hassan.chaitou@telecom-p
 aris.fr
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20231121T153000
DTEND;TZID="Europe/Paris":20231121T160000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20230919T080255Z
DTSTAMP:20230918T183528Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:DCE82AA5-3272-41E9-9646-5FCC0C4A34BE
RRULE:FREQ=MONTHLY;UNTIL=20240327T125959Z;INTERVAL=1;BYDAY=-1WE
EXDATE;TZID="Europe/Paris":20230329T140000
EXDATE;TZID="Europe/Paris":20230426T140000
EXDATE;TZID="Europe/Paris":20230628T140000
EXDATE;TZID="Europe/Paris":20230531T140000
EXDATE;TZID="Europe/Paris":20240228T140000
SUMMARY:[talk.cybercni.fr] Details will follow...
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20230222T140000
DTEND;TZID="Europe/Paris":20230222T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20210723T102627Z
DTSTAMP:20240214T083651Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:DCE82AA5-3272-41E9-9646-5FCC0C4A34BE
SUMMARY:[talk.cybercni.fr] Details will follow...
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20231213T140000
DTEND;TZID="Europe/Paris":20231213T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20231227T140000
LAST-MODIFIED:20231209T003600Z
DTSTAMP:20240214T083651Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:DCE82AA5-3272-41E9-9646-5FCC0C4A34BE
SUMMARY:[talk.cybercni.fr] Generative AI: Ethical Quandaries and the Spread 
 of Misinformation (with Alexander Loth\, Microsoft)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20231124T140000
DTEND;TZID="Europe/Paris":20231124T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
RECURRENCE-ID;TZID="Europe/Paris":20231129T140000
LAST-MODIFIED:20231116T235531Z
DTSTAMP:20240214T083651Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:AB32FED1-5738-4307-9CCF-98586D452405
SUMMARY:[talk.cybercni.fr] T.B.A.\, Sander van der Linden (University of Cam
 bridge)
DESCRIPTION:Protecting against cyber risks is the domain of Cybersecurity. T
 he Cyber CNI Speaker series wants to raise awareness and understanding of cy
 bersecurity topics. It wants to enable a continuous dialog between experts f
 rom industry and academia and the general public\, including individuals\, f
 amilies\, companies from small to large sizes\, and public bodies – in short
  everyone\, since cybersecurity is relevant for each of us.\n\nThe Cyber CNI
  speaker series is a free monthly event on the last Wednesday of the month f
 rom 17h-18h30. The event consists of an expert talk of about 40 minutes foll
 owed by 30 minutes discussion.\n\nThe events happen in the Grand Amphitheatr
 e at IMT Atlantique in Rennes (Cesson-Sévigné) AND are broadcasted live over
  Youtube (https://talk.cybercni.fr/)\, enabling global remote participation 
 and including a tool for participating in the discussion.\nYou are cordially
  invited to participate. Please safe the dates and subscribe to receive emai
 l notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20241213T140000
DTEND;TZID="Europe/Paris":20241213T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20240513T130909Z
DTSTAMP:20240513T130718Z
SEQUENCE:2
URL:https://talk.cybercni.fr/
END:VEVENT
BEGIN:VEVENT
UID:035940E5-87D7-46C7-9CD3-ABBDC180A79F
SUMMARY:AI at the Crossroads: Enhancing Security or Empowering Cyber Threats
 ? (Session CyberCNI.fr à l'ECW)
DESCRIPTION:[Title and detailed description may still change]\n\nAs AI techn
 ologies evolve\, they offer unprecedented capabilities in detecting and miti
 gating cyber threats. Advanced machine learning algorithms can analyze vast 
 amounts of data to identify anomalies\, predict potential breaches\, and aut
 omate responses to cyber incidents. However\, the same technologies that bol
 ster our defenses can be exploited by malicious actors to launch sophisticat
 ed attacks\, evade detection\, and compromise security systems.\n\nMajor Cha
 llenges:\n\n• Sophistication of Attacks: AI-driven attacks can adapt and lea
 rn\, making them harder to detect and counter. Cybercriminals can use AI to 
 develop more effective phishing schemes\, malware\, and ransomware.\n• Defen
 sive AI Integration: Integrating AI into existing cybersecurity frameworks p
 oses significant challenges\, including ensuring data integrity\, managing f
 alse positives\, and maintaining robust\, real-time threat detection.\n• Eth
 ical and Regulatory Issues: The use of AI in cybersecurity raises ethical qu
 estions and necessitates the development of comprehensive regulations to pre
 vent misuse while fostering innovation.\nDiscussion Points:\n\n• AI for Thre
 at Detection: How AI enhances the ability to identify and respond to cyber t
 hreats in real time\, with case studies from critical national and maritime 
 infrastructures.\n• AI Exploitation by Cybercriminals: Examining instances w
 here AI has been used to enhance cyber attacks and discussing strategies to 
 counter these threats.\n• Collaborative Defense Strategies: The importance o
 f public-private partnerships and international collaboration in leveraging 
 AI for cybersecurity while addressing its risks.\n• Future Trends and Innova
 tions: Exploring emerging AI technologies and their potential impact on the 
 cybersecurity landscape\, including predictive analytics\, digital twins\, a
 nd Zero Trust architectures.\nJoin us for an enlightening exchange as expert
 s from the Cybersecurity for Critical National Infrastructures (CyberCNI) an
 d Cybersecurity of Maritime Systems (Cyber Navale) research chairs share the
 ir latest findings and insights. This session promises to deliver a balanced
  perspective on the opportunities and threats posed by AI in cybersecurity\,
  fostering a deeper understanding of how to navigate this complex digital fr
 ontier.\n
LOCATION:Salle 6 (niveau -1)\, Couvent des Jacobins\, 20 Pl. Sainte-Anne\, 3
 5000 Rennes
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20241121T090000
DTEND;TZID="Europe/Paris":20241121T120000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20241113T154911Z
DTSTAMP:20240703T055025Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:A0DFEB98-0EF2-444D-A4BF-0CF956534F41
SUMMARY:AI at the Crossroads: Enhancing Security or Empowering Cyber Threats
 ? (Session CyberCNI.fr à l'ECW)
DESCRIPTION:[Title and detailed description may still change]\n\nAs AI techn
 ologies evolve\, they offer unprecedented capabilities in detecting and miti
 gating cyber threats. Advanced machine learning algorithms can analyze vast 
 amounts of data to identify anomalies\, predict potential breaches\, and aut
 omate responses to cyber incidents. However\, the same technologies that bol
 ster our defenses can be exploited by malicious actors to launch sophisticat
 ed attacks\, evade detection\, and compromise security systems.\n\nMajor Cha
 llenges:\n\n• Sophistication of Attacks: AI-driven attacks can adapt and lea
 rn\, making them harder to detect and counter. Cybercriminals can use AI to 
 develop more effective phishing schemes\, malware\, and ransomware.\n• Defen
 sive AI Integration: Integrating AI into existing cybersecurity frameworks p
 oses significant challenges\, including ensuring data integrity\, managing f
 alse positives\, and maintaining robust\, real-time threat detection.\n• Eth
 ical and Regulatory Issues: The use of AI in cybersecurity raises ethical qu
 estions and necessitates the development of comprehensive regulations to pre
 vent misuse while fostering innovation.\nDiscussion Points:\n\n• AI for Thre
 at Detection: How AI enhances the ability to identify and respond to cyber t
 hreats in real time\, with case studies from critical national and maritime 
 infrastructures.\n• AI Exploitation by Cybercriminals: Examining instances w
 here AI has been used to enhance cyber attacks and discussing strategies to 
 counter these threats.\n• Collaborative Defense Strategies: The importance o
 f public-private partnerships and international collaboration in leveraging 
 AI for cybersecurity while addressing its risks.\n• Future Trends and Innova
 tions: Exploring emerging AI technologies and their potential impact on the 
 cybersecurity landscape\, including predictive analytics\, digital twins\, a
 nd Zero Trust architectures.\nJoin us for an enlightening exchange as expert
 s from the Cybersecurity for Critical National Infrastructures (CyberCNI) an
 d Cybersecurity of Maritime Systems (Cyber Navale) research chairs share the
 ir latest findings and insights. This session promises to deliver a balanced
  perspective on the opportunities and threats posed by AI in cybersecurity\,
  fostering a deeper understanding of how to navigate this complex digital fr
 ontier.\n
LOCATION:Salle 5\, Couvent des Jacobins\, 20 Pl. Sainte-Anne\, 35000 Rennes
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20241121T090000
DTEND;TZID="Europe/Paris":20241121T120000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20240703T055959Z
DTSTAMP:20240703T055959Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:2286D3FA-B076-4558-9F0E-DD555520D329
SUMMARY:CyberCNI @European Cyber Week with Stand all the week and session on
  Thursday mornining!
LOCATION:Centre des Congrès de Rennes - Couvent des Jacobins\n6 Rue d'Échang
 e\, 35000 Rennes\, France
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-APPLE-MAPKIT-HANDLE=CAES1AIIrk0QvcqR
 kqX95dmHARoSCc9DBZW8DkhAESu0FslW5vq/IlsKBkZyYW5jZRICRlIaCEJyaXR0YW55Kg9JbGxl
 LWV0LVZpbGFpbmUyBlJlbm5lczoFMzUwMDBSDlJ1ZSBkJ8OJY2hhbmdlWgE2YhA2IFJ1ZSBkJ8OJ
 Y2hhbmdlKjRDZW50cmUgZGVzIENvbmdyw6hzIGRlIFJlbm5lcyAtIENvdXZlbnQgZGVzIEphY29i
 aW5zMhA2IFJ1ZSBkJ8OJY2hhbmdlMgwzNTAwMCBSZW5uZXMyBkZyYW5jZTgvWnMKJQi9ypGSpf3l
 2YcBEhIJz0MFlbwOSEARK7QWyVbm+r8Yrk2QAwGiH0kIvcqRkqX95dmHARo8CjRDZW50cmUgZGVz
 IENvbmdyw6hzIGRlIFJlbm5lcyAtIENvdXZlbnQgZGVzIEphY29iaW5zEAAqAmZy;X-APPLE-RAD
 IUS=141.1750335693359;X-TITLE="Centre des Congrès de Rennes - Couvent des Ja
 cobins\n6 Rue d'Échange, 35000 Rennes, France":geo:48.115130\,-1.681235
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20241118T120000
DTEND;TZID="Europe/Paris":20241121T181500
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20241105T140508Z
DTSTAMP:20241105T140321Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:E65EACAD-4A6A-4A8F-888E-31445A4FFD35
SUMMARY:Signature de la Phase IV
DESCRIPTION:Salle: La NEF
LOCATION:Le Couvent des Jacobins\n6 Rue d'Échange\, 35000 Rennes\, France
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=T
 RUE:mailto:marc-oliver.pahl@imt-atlantique.fr
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-APPLE-MAPKIT-HANDLE=CAESoQIIrk0QvcqR
 kqX95dmHARoSCYIkR5W8DkhAEVcytsZW5vq/IlsKBkZyYW5jZRICRlIaCEJyaXR0YW55Kg9JbGxl
 LWV0LVZpbGFpbmUyBlJlbm5lczoFMzUwMDBSDlJ1ZSBkJ8OJY2hhbmdlWgE2YhA2IFJ1ZSBkJ8OJ
 Y2hhbmdlKhdMZSBDb3V2ZW50IGRlcyBKYWNvYmluczIQNiBSdWUgZCfDiWNoYW5nZTIMMzUwMDAg
 UmVubmVzMgZGcmFuY2U4L1ABWlsKKAi9ypGSpf3l2YcBEhIJgiRHlbwOSEARVzK2xlbm+r8Yrk2Q
 AwGYAwGiHy4IvcqRkqX95dmHARohChdMZSBDb3V2ZW50IGRlcyBKYWNvYmlucxAAKgJmckAA;X-A
 PPLE-RADIUS=141.1750344482048;X-TITLE="Le Couvent des Jacobins\n6 Rue d'Écha
 nge, 35000 Rennes, France":geo:48.115130\,-1.681235
ORGANIZER;CN=CyberCNI:mailto:cybercni@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20241120T193000
DTEND;TZID="Europe/Paris":20241120T200000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20241111T215312Z
DTSTAMP:20241111T215132Z
SEQUENCE:2
END:VEVENT
BEGIN:VEVENT
UID:742B381B-CF9D-4BE3-883B-2A27D4A67AB7
SUMMARY:Télétravail Rachelle
DTSTART;VALUE=DATE:20250108
DTEND;VALUE=DATE:20250110
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-ALLDAYEVENT:TRUE
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20250107T172443Z
DTSTAMP:20250107T172443Z
SEQUENCE:0
BEGIN:VALARM
ACTION:NONE
TRIGGER;VALUE=DATE-TIME:19760401T005545Z
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
BEGIN:VEVENT
UID:2D50B404-7379-4C10-8B6C-478A5B104A7C
SUMMARY:ECW Session Chaire Cyber CNI
LOCATION:Dortoire\, Le Couvent des Jacobins\n6 Rue d'Échange\, 35000 Rennes\
 , France
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20251120T090000
DTEND;TZID="Europe/Paris":20251120T120000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20250912T102809Z
DTSTAMP:20250912T102659Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:E62C10FC-E25E-48BA-A84C-A38F4FA4E071
SUMMARY:ECW Session Chaire Cyber CNI
LOCATION:Dortoire\, Le Couvent des Jacobins\n6 Rue d'Échange\, 35000 Rennes\
 , France
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20251120T090000
DTEND;TZID="Europe/Paris":20251120T120000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20250912T102816Z
DTSTAMP:20250912T102816Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:34A1379D-786A-4AB5-9CA1-4612B68D42C4
SUMMARY:ECW 2026?
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
DTSTART;TZID="Europe/Paris":20261116T120000
DTEND;TZID="Europe/Paris":20261119T180000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20260213T135700Z
DTSTAMP:20260213T135642Z
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
UID:0045967E-51D4-4856-9A74-003DCB03473E
SUMMARY:[T45] Living in a warzone – how cybersecurity changes in times of wa
 r – Taras Panchenko
DESCRIPTION:🔴 LIVE – Cyber CNI Lecture Series #45\n\nLiving in a Warzone – 
 How Cybersecurity Changes in Times of War (Example: Ukraine)\nwith Taras Pan
 chenko (National University of Kyiv\, Ukraine)\n\n📅 Friday\, March 6th\, 20
 26\n🕑 2:00 PM CET\n🌍 Join the live stream: https://TALK.CYBERcni.fr/stream
 \n\nWhat happens to cybersecurity when a country is at war?\n\nWhen power gr
 ids are targeted.\nWhen communications collapse.\nWhen misinformation spread
 s faster than verified information.\nWhen electricity\, heating\, water\, an
 d mobile networks cannot be taken for granted.\n\nFor Ukraine\, this is not 
 a scenario. It is reality.\n\nIn this powerful and timely lecture\, Taras Pa
 nchenko shares first-hand insights into how cybersecurity priorities fundame
 ntally shift during wartime. From infrastructure resilience and communicatio
 n breakdowns to real cyberattacks against Ukrainian systems\, this talk expl
 ores how digital security becomes a matter of societal survival.\n\n💡 Topic
 s include:\n\nInfrastructure challenges under active conflict\n\nCyberattack
 s targeting critical systems\n\nCommunication resilience strategies\n\nInfor
 mation warfare and misinformation\n\nLessons for governments\, companies\, a
 nd citizens\n\n🎓 About the Cyber CNI Lecture Series\nThe Cyber CNI Lecture 
 Series is a free monthly event dedicated to raising awareness and understand
 ing of cybersecurity challenges. It brings together experts from academia an
 d industry and is open to everyone — citizens\, businesses\, public organiza
 tions\, and policymakers.\n\nThe event is streamed live and includes interac
 tive participation.\n\n🌍 More information & program: https://talk.cybercni.
 fr/\n\n📩 Subscribe to invitations: https://TALK.CYBERcni.fr\n\n👍 Like\, sh
 are\, and subscribe to stay informed about upcoming cybersecurity talks.\nYo
 ur participation helps strengthen informed dialogue on digital resilience.\n
 \n#CyberSecurity #Ukraine #CriticalInfrastructure #CyberResilience #Informat
 ionWarfare #CyberCNI\n\n- - -\n\n\nProtecting against cyber risks is the dom
 ain of Cybersecurity. The Cyber CNI Speaker series wants to raise awareness 
 and understanding of cybersecurity topics. It wants to enable a continuous d
 ialog between experts from industry and academia and the general public\, in
 cluding individuals\, families\, companies from small to large sizes\, and p
 ublic bodies – in short everyone\, since cybersecurity is relevant for each 
 of us.\n\nThe Cyber CNI speaker series is a free monthly event on the last W
 ednesday of the month from 17h-18h30. The event consists of an expert talk o
 f about 40 minutes followed by 30 minutes discussion.\n\nThe events happen i
 n the Grand Amphitheatre at IMT Atlantique in Rennes (Cesson-Sévigné) AND ar
 e broadcasted live over Youtube (https://talk.cybercni.fr/)\, enabling globa
 l remote participation and including a tool for participating in the discuss
 ion.\nYou are cordially invited to participate. Please safe the dates and su
 bscribe to receive email notifications!
LOCATION:https://talk.cybercni.fr/
X-APPLE-TRAVEL-ADVISORY-BEHAVIOR:AUTOMATIC
ORGANIZER:mailto:marc-oliver.pahl@imt-atlantique.fr
DTSTART;TZID="Europe/Paris":20260306T140000
DTEND;TZID="Europe/Paris":20260306T153000
STATUS:CONFIRMED
CLASS:PUBLIC
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
TRANSP:OPAQUE
LAST-MODIFIED:20260225T094901Z
DTSTAMP:20260225T094815Z
SEQUENCE:6
END:VEVENT
END:VCALENDAR
