INTRINSEC INTRINSEC INTRINSEC INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
Contact

Expert perspectives

Security Watch

Le SSTIC, les utilisateurs et internet

Cyrille BARTHELEMYJune 24, 2011
SSI Council, Security Watch

CLUSIR RhA – Intervention sur les tableaux de bord SSI

AdminApril 7, 2011
Safety Assessment

R&D : Outil d'extraction de mots de passe AD

AdminSeptember 7, 2010
SOC Operational Security, Security Watch

CLUSIR Lyon – Intervention sur la gestion des vulnérabilités

Cyrille BARTHELEMYMay 20, 2010
Security Watch

Ipv6, à la rescousse!

Cyrille BARTHELEMYMarch 17, 2010
Security Watch

Keynote SSTIC 2009 – Calcul sur cartes graphiques, cryptographie et sécurité

Cyrille BARTHELEMYJune 8, 2009
Safety Assessment, Security Watch

Keynote SSTIC 2009 – Fuzzing, past present and future

Cyrille BARTHELEMYJune 5, 2009
Security Watch

Keynote SSTIC 2009 – Airbus

Cyrille BARTHELEMYJanuary 18, 2009
Safety Assessment, Security Watch

Keynote SSTIC 2009 – Injection de code dans une javacard

Cyrille BARTHELEMYJanuary 18, 2009
SOC Operational Security, Security Watch

Keynote SSTIC 2009 – Utilisation du Data Tainting pour les analyses de logiciels malveillants.

Cyrille BARTHELEMYJanuary 18, 2009
Security Watch

SSTIC Live Blogging – Jour 1 Aprés-midi

Cyrille BARTHELEMYJanuary 18, 2009
SOC Operational Security, Security Watch

Keynote SSTIC 2009 – Désobfuscation automatique de binaires

Cyrille BARTHELEMYJanuary 18, 2009
  • 1
  • …
  • 20
  • 21
  • 22
  • 23
Logo_Isec_Slogan_white

Our job? To protect yours.

  • Who are we ?
  • Recruitment
  • Cookie Policy
  • Personal Data Protection Charter
  • Legal notice
  • Offensive Security & Auditing
  • SSI Council
  • Security Architecture & Integration
  • SOC - Security Operation Center
  • CTI – Cyber Threat Intelligence
  • CERT - Incident Response
  • © Intrinsec 2025 | All rights reserved
INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
INTRINSEC
About cookies

With your consent, Intrinsec uses cookies or similar technologies and processes personal data based on legitimate interests, to optimize the advertising campaigns we conduct on third-party sites (such as LinkedIn), but also to track our audiences (Umami).

By clicking on "I choose" you will access the detailed list of these cookies.

 

You can modify and customize the settings for the purposes of processing cookies and trackers for which you have given your consent. You can also object to all of these processing activities. Your choice will be saved for a period of 6 months.

Analytical storage Always active
Allow Google Analytics to measure how I use the site to improve functionality and service.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Advertising storage
The technical storage or access that is used exclusively for statistical purposes. Allow Google to save advertising information on my device for better ad relevance.
User advertising data
Sharing my activity data with Google for targeted advertising.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Choose my preferences
  • {title}
  • {title}
  • {title}
English
French