Lustrum Cyber Talk with Marc Goodman – 8 December 2020
In the Lustrum Cyber Talk with our Chairman Jan De Blauwe, Marc Goodman looked back on the past five years' technology evolution through a unique wide-angle lens of cybercrime.
19 November 2020 – Cyber Security Coalition
Those pesky cookies! Website visitors hate them; publishers and the ad industry live or die by them (particularly ‘third party’ cookies). But what are cookies, who use them, how and why? Many people don’t know all they should know about cookies. This presentation by Grégoire le Hardy and Emile Cras from Semetis – a digital advertising and BI company – succinctly provides that needed knowledge from a predominantly technological and operational point of view (the legal POV will be covered in a second session). The uses of cookies are listed, including a beneficial use for ‘frequency capping’ (limits the exposure of somebody’s ads to a particular user). The interests of the stakeholders too are discussed (publishers rely on cookies for about 50 percent of revenues). Furthermore, the cookie consent handling process is explained.
Of more importance yet in this presentation is an insight into a future without (‘third party’) cookies. Google’s statement of ‘Chrome phasing out third-party cookie by 2022’ puts pressure on finding alternatives for today’s advertising practices (and revenues). The Semetis experts discuss today’s Google Consent mode (conversion analytics without third party cookies), as well as ideas for alternative identifiers or solutions without direct cookie replacements (e.g. contextual targeting). Get your first glimpse of a cookieless future here!
In the Lustrum Cyber Talk with our Chairman Jan De Blauwe, Marc Goodman looked back on the past five years' technology evolution through a unique wide-angle lens of cybercrime.
In this webinar Nataliia Bielova and Cristiana Teixeira Santos decipher EU legal requirements on consent and analyze the technical means available to verify compliance of cookie banners.
This webinar helps you understand the key elements to implement a Coordinated Vulnerability Disclosure Policy supported by a bug bounty programme, whether you work for a corporation, nonprofit, open source project, or public entity.
Absence of evidence is not evidence of absence! This aphorism is more than ever valid in Cyber Security, people stating that they never had a breach probably simply do not know that they have been breached. This presentation given by Luk Schoonaert – Director of Technology @ Exclusive Networks, Value Add Distributor of Emerging Technologies […]
In this webinar Marc Wouters presents the NIS supervisory strategy for Digital Service Providers. The mission of the FPS Economy is to create the conditions for a competitive, sustainable and balanced operation of the goods and services market in Belgium.