{"id":82809,"date":"2018-07-09T08:00:18","date_gmt":"2018-07-09T08:00:18","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/07\/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102\/"},"modified":"2025-11-14T15:10:24","modified_gmt":"2025-11-14T15:10:24","slug":"registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/07\/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102\/","title":{"rendered":"Inscriptions sont ouvertes pour \u00ab\u00a0Cyber Diplomacy Meets InfoSec and Technology\u00a0\u00bb en m\u00eame temps que le IETF 102"},"content":{"rendered":"<p>Comme nous<a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/06\/at-ietf-102-the-global-commission-on-the-stability-of-cyberspace-cyber-diplomacy-meets-infosec-and-technology\/\"> l&rsquo;avons annonc\u00e9 r\u00e9cemmen<\/a>t, la Commission mondiale sur la stabilit\u00e9 du cyberespace (<a href=\"https:\/\/cyberstability.org\/\">Global Commission on the Stability of Cyberspace<\/a>\u00a0&#8211; GCSC) organisera un d\u00e9jeuner-d\u00e9bat sur \u201c<a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-102\/gcsc-event\/\">Cyber Diplomacy Meets InfoSec and Technology<\/a>\u201d aux c\u00f4t\u00e9s de l&rsquo;IETF 102 le mardi 17 juillet. L&rsquo;inscription d\u00e9bute aujourd&rsquo;hui dans deux cr\u00e9neaux horaires pour l&rsquo;\u00e9quit\u00e9 mondiale, \u00e0 08:00 UTC et 20:00 UTC.<a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-102\/gcsc-event\/\"> Inscrivez-vous ici<\/a>.<\/p>\n<p>La Commission mondiale sur la stabilit\u00e9 du cyberespace \u00e9labore des normes et des initiatives politiques qui visent \u00e0 contrer les risques pour la s\u00e9curit\u00e9 et la stabilit\u00e9 globales du cyberespace en raison de l&rsquo;augmentation des cyberactivit\u00e9s offensives, en particulier celles des \u00c9tats. Au cours de cette session, la Commission veut informer et engager la communaut\u00e9 de l&rsquo;IETF sur son travail jusqu&rsquo;\u00e0 pr\u00e9sent et le travail qui est en cours.<\/p>\n<p>L&rsquo;Internet Society aide avec la logistique. <strong>Olaf Kolkman<\/strong>, administrateur en chef de la technologie Internet de l&rsquo;Internet Society et commissaire de la CCSN, animera le panel. Les pan\u00e9listes sont:<\/p>\n<ul>\n<li><strong>Irina Rizmal,<\/strong> chercheuse \u00e0 la DiploFoundation sp\u00e9cialis\u00e9e dans l&rsquo;analyse des politiques en mati\u00e8re de s\u00e9curit\u00e9 nationale et de d\u00e9fense.<\/li>\n<li><strong>Bill Woodcock<\/strong>, commissaire et directeur g\u00e9n\u00e9ral de Packet Clearing House, l&rsquo;organisme \u00e0 but non lucratif qui prend en charge l&rsquo;infrastructure Internet critique.<\/li>\n<li><strong>Jeff Moss<\/strong>, commissaire, fondateur de Black Hat et Defcon, membre du conseil de s\u00e9curit\u00e9 du DHS, et ancien CSO de l&rsquo;ICANN.<\/li>\n<\/ul>\n<h2>Lieu<\/h2>\n<p>La table ronde aura lieu le mardi 17 juillet au Fairmont The Queen Elizabeth \u00e0 Montr\u00e9al, en m\u00eame temps que l&rsquo;IETF 102. Le d\u00e9jeuner sera offert aux pr\u00e9-inscrits.<\/p>\n<h2>Inscriptions<\/h2>\n<p>Une pr\u00e9-inscription est requise pour assister \u00e0 ce panel d&rsquo;information en personne. L&rsquo;inscription est maintenant ouverte, alors <a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-102\/gcsc-event\/\">inscrivez-vous ici<\/a>.<\/p>\n<p>Cet \u00e9v\u00e9nement sera \u00e9galement diffus\u00e9 sur le Web et audiocast. La pr\u00e9-inscription (ou participation \u00e0 l&rsquo;IETF) <strong>n&rsquo;est pas obligatoire pour participer en ligne<\/strong>. Regardez cet espace ou la session pour plus d&rsquo;informations et des liens sur la participation \u00e0 distance.<\/p>\n<p>Nous esp\u00e9rons que vous pouvez nous rejoindre \u00e0 Montr\u00e9al, ou en ligne!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comme nous l&rsquo;avons annonc\u00e9 r\u00e9cemment, la Commission mondiale sur la stabilit\u00e9 du cyberespace (Global Commission on the Stability of Cyberspace\u00a0&#8211; GCSC) organisera un d\u00e9jeuner-d\u00e9bat sur \u201cCyber Diplomacy Meets InfoSec and Technology\u201d aux c\u00f4t\u00e9s de l&rsquo;IETF 102 le mardi 17 juillet. L&rsquo;inscription d\u00e9bute aujourd&rsquo;hui dans deux cr\u00e9neaux horaires pour l&rsquo;\u00e9quit\u00e9 mondiale, \u00e0 08:00 UTC et 20:00 [&hellip;]<\/p>\n","protected":false},"author":819,"featured_media":81875,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,189,151,169,172,4909,4775,183],"tags":[6215,6056,3376],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4083],"class_list":["post-82809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-evenements","category-ietf-fr-2","category-les-normes-internet-ouvertes","category-politique-publique","category-renforcer-internet","category-securite-fr","category-technologie","tag-evenements","tag-ietf-meetings-fr","tag-ietf-fr","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1.png",2700,1000,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-300x111.png",300,111,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-768x284.png",768,284,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-1024x379.png",1024,379,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1.png",1536,569,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1.png",2048,759,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-250x93.png",250,93,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-600x600.png",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1.png",300,111,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1.png",400,148,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1.png",600,222,false]},"uagb_author_info":{"display_name":"Megan Kruse","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kruse\/"},"uagb_comment_info":0,"uagb_excerpt":"Comme nous l&rsquo;avons annonc\u00e9 r\u00e9cemment, la Commission mondiale sur la stabilit\u00e9 du cyberespace (Global Commission on the Stability of Cyberspace\u00a0&#8211; GCSC) organisera un d\u00e9jeuner-d\u00e9bat sur \u201cCyber Diplomacy Meets InfoSec and Technology\u201d aux c\u00f4t\u00e9s de l&rsquo;IETF 102 le mardi 17 juillet. L&rsquo;inscription d\u00e9bute aujourd&rsquo;hui dans deux cr\u00e9neaux horaires pour l&rsquo;\u00e9quit\u00e9 mondiale, \u00e0 08:00 UTC et 20:00\u2026","authors":[{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/82809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/819"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=82809"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/82809\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/81875"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=82809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=82809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=82809"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=82809"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=82809"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=82809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}