Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Atos cyber awareness month

In October 2022, to celebrate cybersecurity awareness month, Atos had an action-packed month filled with live sessions, awareness videos, and more to help accelerate your efforts to educate employees on crucial cybersecurity topics.

Hear from our top cybersecurity experts and partners on how to fortify your company’s defenses and enable your employees to defend your organization.

Fortify your cyber defenses

Discover our four LinkedIn live sessions on key topics that can help you improve your cybersecurity posture.

 

Watch recordings:

How to build and maintain resilient critical infrastructure

October 6th 2:00 pm CET
Watch
recording

Matan Dobrushin
VP Research, Otorio

Antoine D’Haussy
OT Security Practice Head EMEA, Fortinet

Jose Varghese
Head of Security Operations Center, Atos

Mariana Peycheva

Moderator – Mariana Peycheva
Global Cybersecurity Alliance Manager, Atos

How to build and maintain resilient critical infrastructure

You cannot afford to let some systems go down given their criticality for your business operations and services delivery. Unfortunately, these are the same systems malicious actors target, compromise, and hold hostage during attacks like ransomware.

Join this LinkedIn Live event to learn how to protect these systems and always ensure their operations, even during a breach.

Watch recording

Can you stop phishing attacks? How?

October 13th4:00 pm CET
Watch
recording

André Couturier

André Couturier
Principal Cyber Security Consultant, Atos

Jean-Joseph Herpin

Jean-Joseph Herpin
Business and solution manager, Atos

Marc Johnson

Marc Johnson
Global Head of Security Awareness, Atos

Dan Butnaru

Moderator – Dan Butnaru
Marketing Manager, Atos Cybersecurity Products

Can you stop phishing attacks? How?

According to the Verizon 2022 DBIR, this year 82% of breaches
involved the human element. Many of these breaches still begin with a basic phishing message that tricks an employee into clicking a link, providing credentials, or otherwise giving an attacker access to your network.

Join this LinkedIn Live event to learn how to protect yourself from these inevitable human errors without getting in the way of your employee’s ability to complete their day-to-day job.

Watch recording

How are regulatory authorities helping organizations combat cyber threats?

October 18th 4:00 pm CET
Watch
recording

Zeina Zakhour

Zeina Zakhour
VP, Global CTO Digital Security, Atos

Dr. Evangelos Ouzounis

Dr. Evangelos Ouzounis
Head of Policy Development and Implementation Unit, ENISA

Laurence Begou

Moderator – Laurence Begou
Institutional Relations and Communication Director for Digital Security

How are regulatory authorities helping organizations combat cyber threats?

With cyber attacks targeting critical infrastructures everyday – from hospitals to water or energy distribution systems – regulatory authorities are forced to act.

Join this LinkedIn Live event to discuss the role of regulatory authorities in shaping not only cybersecurity regulations, standards and policies, but also in helping you combat evolving threats.

Watch recording

Future of digital and data sovereignty.
How can your business adapt?

October 25th 4:00 pm CET
Watch
recording

Vasco Gomes
Global CTO Cybersecurity Products & Digital Security Offering Technology Lead, Atos

Nagib Aouini
CEO & founder, DuoKey

Cyril Voisin
Chief Security Advisor EMEA, Microsoft

Marjolaine Lombard

Moderator – Marjolaine Lombard
Cybersecurity Products Offering Manager, Atos

Future of digital and data sovereignty.
How can your business adapt?

You’re in a bind. More of your operations than ever are driven by digital technologies and user data whereas customers are increasingly demanding more visibility and control over how you collect, use, and share their data.

Joint this LinkedIn Live event to discuss how to adapt to meet new digital and data sovereignty needs, what changes to make or even where to begin.

Watch recording

Useful tips from experts

How can you identify a malicious website

How to protect your digital access

How to identify a phishing email

How to safely install 3rd party applications

How to build agile SOC?

How to balance security with DevOps practices?

Top 2022 trends for incident response

What role for AI in Managed Detection & Response advancement

How can organizations holistically approach OT security?

How vulnerability research helps combat emerging threats

To follow or contact us:
Linkedin | Twitter

Upgrade your career: make the leap to cyber!

Cybersecurity can sound blurry and complex at first, or feel reserved to IT-specialists or nerds … but it is not. The cybersecurity ecosystem is wide, welcoming and full of opportunities! Entering and learning cyber is like learning a foreign language or climbing a mountain: it takes a bit of time and feels unsurmountable at the beginning, but it brings a tremendous satisfaction at every step of accomplishment mastering a new topic, concept or tech.

Whether you are already in IT or in support functions, junior or senior, the cybersecurity world has a seat for you. If you’re already passioned about tech, or just have a curious mindset and strong motivation, make the leap to cyber, the top growing ecosystem that will transform our world and way-of-life for the next centuries to come!

Cyber Academy – Graduate program

Last May, we launched our first cyber-focused graduate program to attract 0-5 years IT juniors to the cybersecurity field.

Designed in 3 phases, this 100+ days of intensive training will provide our “Trainees” with 10 weeks of cyber fundamentals courses, 1 week of shadowing abroad, and 9 weeks of specializations (DFIR, SOC or Consulting). Including a close mentoring with our experts.

Learn more about the program or apply here >

Women in Cyber

How much gender diversity brings to the workplace? Creativity, empathy, different perspectives on leadership, problem-solving and decision-making.

According to the ICS’ 2019 Cybersecurity Workforce Study, women working in cybersecurity only account for 24% of the overall workforce. So join us to break the bias!

Listen to our Atos Cyber super-women who’ve made the

Listen to our Atos Cyber super-women who’ve made the leap! >

Open positions

We are hiring! Join the Atos Cybersecurity family present all over the word, and for all industries and markets. Whether you are an engineer, developer, analyst, consultant, or in support functions like marketing, communication, finance, and HR: we want you

Check out our job offers in Cybersecurity >

White Paper

Security analytics use cases for threat hunting

Find out how security analytics-driven threat hunting can help you when a rule-based and manual approach is no longer enough.

White Paper

Cybersecurity: building trust in hybrid cloud

How to create value with a secure hybrid cloud? Securing the cloud can be more. Discover how a carefully considered cloud strategy can deliver comprehensive security while stimulating business and digital innovation.

White Paper

Buyer’s guide to Managed Detection and Response (MDR)

Learn how to bring turnkey next-generation defense to your organization.

E-Book

The ultimate ransomware defense guide

90% of ransomware attacks are preventable (Gartner), but this cannot be achieved with an EDR or XDR platform alone.

Access our complete guide aligned to the NIST framework to build and sharpen your defenses and keep ransomware actors out.

Online magazine

Digital security magazine – Security enlightening your Cloud

Have you unlocked the true potential of your cloud? Read more about how a well designed and implemented cloud security strategy can offer significant advantages to stay ahead of competition.

Cybersecurity tech radar

Because with new technologies come new cybersecurity challenges, we created the Cyber Tech Radar, to help you navigate through the trends that will shape the next 5 years. The 2022 edition analyzes more than 150 techs and trends, in the top 8 domains.

Consulting

To implement a secure environment, a strong cybersecurity program built around people, processes and technology is required.

Atos Cybersecurity consulting capabilities can support organizations in their daily commitment to the implementation of a successful cybersecurity program.

MSS

Atos offers a full spectrum of managed security services around the clock and across the globe. Choose our complete MSS package or the specific solutions your business needs from SOC services, Managed Detection & Response , Threat Intelligence, CSIRT Services, Vulnerability Management, Managed IAM to Digital Forensics and Incident Response.

Cloud Security

Prevent, protect and preserve security in the cloud leveraging a portfolio of services.
Atos approaches cloud security through 3 simple dimensions: how to prevent, protect and preserve security in the cloud leveraging a portfolio of services that can underpin this approach transversally.

Trusted identities for people and devices

Atos provides physical person authentication for access to information technology systems and e-Services, as well as for exchanging information in complete security, with its products IDnomic for users. With the increasing need of IoT and OT security, Atos also delivers, with its IDnomic for objects products, digital identities to machines and connected objects.

Data encryption

As a cryptographic provider, Atos guarantees the confidentiality of your sensitive data .
Trustway data encryption products — including hardware security modules (HSM General Purpose and HSM Payment), network encryption and encrypted external drive — comply with the strongest international standards and certifications.

Identity & Access Management

Evidian Identity and Access Management products provide answers to four key challenges:

  • Reinforce your identity security policy for all users, devices, cloud and on-premises applications
  • Ensure easy, secure and autonomous access to your users, removing passwords
  • Be compliant with regulations and prove it
  • Optimize costs by accelerating delivery of the right business and user access to applications, with less password reset support

Register here

to receive exclusive content from Atos
about Cybersecurity topics

Thank you for your interest. You can download the report here.
A member of our team will be in touch with you shortly

Contact us

Laurence Bégou

Institutional Relations and Communication Director for Digital Security

Follow or contact Laurence

Carole Hivin

Carole Hivin

Event & Communication Officer

Follow or contact Carole