In Search We Trust How does an EU search engine contribute to cybersecurity? EESC, Tuesday, 9 January 2018 Guillaume Vassault-Houlière, on behalf of Eric.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Together. Free your energies How open and collaborative are public administrations in Europe? A benchmarking perspective October 2011.
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
Csci5931 Web Security1 Case Study: A Forensic Lesson for Web Security (MSS, part one)
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
The Business Contribution to Development and Safe Trade UN Economic Commission for Europe Second International Forum on Trade Facilitation, 15 May 2003.
EU Information and Publicity Policy Claudia Salvi e Anna Claudia Abis Formez 8 May 2007.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
European Interoperability Architecture e-SENS Workshop : Document Interoperability Solutions use case 7-8 January 2015.
Business support for SMEs CCIRB’s initiatives Presented by Anemari Marcusanu Business Information Analyst Chamber of Commerce and Industry of Romania and.
Joseph Ferracin Director IT Security Solutions Managing Security.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
LATVIAN PRESIDENCY: JANUARY – JUNE The circular shape represents unity and wholeness: commonly held ideals and values upon which the European project.
Project Proposal Interface Design Website Coding Website Testing & Launching Website Maintenance.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Top 10 Privacy Risks in Web Applications Method, results and some countermeasures 29 May 2015 Florian Stahl (Project Leader) Sponsored by.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
How regulation has improved services – a utilities perspective Bruno Tisserand EurEau President.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
EN Regional Policy EUROPEAN COMMISSION Information and Publicity Structural Funds Information Team Brussels, 30 June 2005 Barbara Piotrowska, DG REGIO.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
THE CENTRAL SECURITY PLATFORM GUARDIAN360 IS PART OF THE INTERMAX GROUP.
THE CULTURAL AND CREATIVE HIGH-END INDUSTRY AS A KEY DRIVER FOR THE GROWTH OF THE EUROPEAN ECONOMY Mr. Armando Branchini – ECCIA President November 9th,
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Digital Single Market Valentinas KVIETKUS Baltic Assembly, Ryga
A policy framework for an open and trusted Internet
CYBERSECURITY SOLUTIONS
Performing Risk Analysis and Testing: Outsource or In-house
Hotspot Shield Protect Your Online Identity
CHAPTER FOUR OVERVIEW SECTION ETHICS
Security of In-Vehicle Software
Security Standard: “reasonable security”
Real-time protection for web sites and web apps against ATTACKS
MISY3321- Intro. to Information Assurance
Threat Management Gateway
Speaker’s Name, SAP Month 00, 2017
What is an anonymous reporting hotline?
Today’s Risk. Today’s Solutions. Cyber security and
Building a Security Operations Center
Internet Basics.
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Unit 27 Web Server Scripting Extended Diploma in ICT
Review of the Telecom Framework – Security rules Security rules in the proposed European Electronic Communications Code (EECC) Lisbon, 8 March 2017.
SMB practice development: Security play
The Pentester’s View on Blockchain Projects
Security Essentials for Small Businesses
Network Security Best Practices
E-Commerce for Developing Countries (EC-DC)
Trust and Security Unit
Health Care: Privacy in a Digital Age
SMB practice development: Security play
Economic and social cohesion in the Western Balkans - cybersecurity
Cyber Security professions Overview
eSafetyLabel+ Ambassadors Team
How to Mitigate the Consequences What are the Countermeasures?
ETNO & RIPE Cooperation
CHAPTER FOUR OVERVIEW SECTION ETHICS
The European Union response to cyber threats
Community of Users.
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
What is an anonymous reporting hotline?
Presentation transcript:

In Search We Trust How does an EU search engine contribute to cybersecurity? EESC, Tuesday, 9 January 2018 Guillaume Vassault-Houlière, on behalf of Eric Léandri, CEO of Qwant

An ethical vision for the Web Our vision is based on two principles Privacy by design Neutrality QWANT.COM Launched in 2013 European search engine Investors : Caisse des Dépôts and Axel Springer In 2015, the European investment bank also decided to support Qwant up to 25 million euros

In Search We Trust No cookie No history of your queries No association of queries with IP addresses in our logs No third party scripts on our pages Encryption everywhere (HTTPS) Servers in Europe only Right to be forgotten

All-in-one search (Web, news, pictures, social…)

The search engine for kids Qwant Junior is the first safe and secure full blown search engine for kids. It provides answers from the whole internet, eliminates unsafe content and highlights positive resources. Qwant Junior is built on Qwant’s technologies and values privacy: no history, no tracking ... neutrality: same results for anyone Qwant Junior is free, and ad-free.

Platform privacy leaks RISK – Main threats Waterholing Platform privacy leaks User data leakage Company data leakage

Security/Privacy is high priority for Qwant Infosec dedicated team Pentest programs Bug bounty program on first European Platform bountyfactory.io In 2016, Qwant invest on this Platform Vulnerability monitoring, Digital forensics and incident response Custom next generation firewall for Qwant infrastructure Custom security tools Contribute to the next generation of IPS/IDS solution Secure coding course for Qwant’s developers Continuous tests on QA stage CNIL audit about user privacy

Security & Privacy are good and strong allies for EU Thanks in particular to GDPR and the NIS directive Thanks to our national authorities such as the French CNIL (National Commission focused on Privacy) By implementing European Security certifications Proposal for a regulation - COM (2017) 477/947932 title III Drawing on the experience of our national security agencies such as ANSSI in France Relying on external actors to strengthen European security and privacy policies : Qwant, YesWeHack, community of ethical hackers.... Strengthening public/private partnerships Investing in the fundamentals of tomorrow's European digital economy Let's protect the common good and our European citizens together

Thank you! Guillaume Vassault-Houliere CISO Qwant CEO YesWeHack Co-Founder President of « nuit du hack »