Embed code
Note: this content has been automatically generated.
good afternoon ladies and gentlemen please join me in welcoming yet today
an dying dewey this yeah you'll have the i am
professor at u. t. f. l.
yeah the
and the masses are i would change and innovation seemed content development of places the active effort
actually the cyber security at it's all about uh what we have seen today
and it's nice to be a twenty vacation but as well or activity
yeah i would like to thank you for the for you to to me today as as you understood
oh train was willing to come today as well as their segments or from from my grand we have the chance
to have two replacement i on on the last minute so that's about cyber security actions thank you very much
and as we as we said and that there is definitely some
some threats and spots is a part of that as well
and today what would like to discuss with all of you is that to
get a heinous uh regarding yeah your your and profession and and your
and know how in your difference organisation to understand how we could
take aspect is is and improve our security and our environment
to make passports organisation as as safe as possible within at this this new challenges
and to start with i would like to give the and the the talk to an actual caribou
we'll explain at you as well the founder of the c. forty t. that centre for the top transcended their phone
uh if you can give us some and and obviously some backgrounds about it and what is
uh what it half as an academic institution is doing for this unstable
okay thanks a lot and uh thanks for a biting me to participate in this a bundle
um it is true that uh trust as a general concept is something that is uh
the war of human activities interest is needed for
business but also for sports for um establishing your appropriate
to rules of interaction between a human beings
and a and people have established a techniques uh across
the centuries to choose to fortify a trust
now what happens is that with the development of digital musician
much of of the human activity is movie to or something that is into ploughed
it is the mediated by the internet and but are you sick try devices
and the tools of that were developed for to develop trust such
as up the language the legislation the institutions et cetera
do not matter cannot cannot be actually mapped to the digital world for a number
of reasons uh that uh are what uh i think it to it even
as a consequence we are witnessing nowadays uh uh
level of distrust the digital world that is white or or menu
and or sport activities or not immune to this evolution
it was a consequence we uh it's what you prefer that we we we have decided to set up centre
for the shock crossed reinforce draw some to develop the tools the technical tools notably to
reinforce a trust round to notions of a good program fee of block changes
a privacy protection and those who on no more specifically
in the case of the sport activities one of
the challenges that is uh uh that would have to
be faced with the fact that um the
there's going to be more and more accurate measurements of the rich human body of the human activity
uh by by lifestyle the tractors and the school through the progress of
personalise medici we should is it going to be much more
actuate a characterisation of for each of us from which that's a body point of view
in the future and this data ah have tremendous value because that a lot
about the level of health in which we are but equals goes review that
uh at a point in time the level of stress the mindset and uh and so on and so
the more uh there's going to be a precision a digit position of of of the sport
the more the challenge of protecting these data and making you use
of these data inappropriate context is going to become relevant
i think your shop yeah and i would have to do that to talk to uh to to match well one from from a criticism from the banking
and lyman which is known and and then the recognition of being safe and
huh how do you uh kind of move forward as well knowing that
the the hundred presents the safety is not an option you have to to cope with risk as well so how do you create because you
about this innovation group uh within your your team so how do you work uh on on that that that's thank you yes so warm
i think there's a sense of what you know about this but ah so many seasons i think for
us to some thirty things that i'd like to share with you in the first is home
the uh the fastest in the sense that didn't know technologies can convey find definitions have some companies that just
maybe suisse in some sense say above on the tougher technology you know you know industries um and so
not necessarily a barometer for everything that has been in
manhattan vomit before um what's effective by society
and so what we're doing it does with his own
we i have started to move um what a lot of
our infrastructure enough have specific about how to manage the
marker for for where we are in terms of a site intently how willing to expansion concerted digits huge
uh_huh
and what we're not and we're not able to see what we're not willing to sit except things so warm
maybe yeah when you are frustrated has little bit biotechnology offices
who your home is if you're using your organisation saying
there are many opportunities in the clout than any pitching t.'s on to the to this new technology landscape
but um maybe we should not go there yet because the security landscape there is it'll be less
clear that made you can say just you technology of says that even criticism everybody right
and and that's the that's the first um aspect bitter like attach one and the second act aspect about like to touch upon is the
notion of foam of on
is the notion of oh how could he says they're inhibition of phone compliance how we own
citing the code have allows that are in the financial services industry and with both my stations
but financial services banking and and sport yeah aspiration or continuum industries
people want to um either because something which refuge in the financial services so they want to build
something to with this aside and with some with support five and on and share something together
and so because of aspiration make sure both of those industries of there is perhaps they
i shed security for uh if people want to talk to society people
want to talk it only on the other side offencive itself then
making it in a service pack is the financial industry interested usually oh making a a
a similar attack is the sporting organisation of a sporting event how cheap similar goals
it is not just that it is not just the the large external factor
which home perhaps could issues can share with disposable pronunciations it is how
we all knew monitor the fact for who the internal flights how many
home do the right thing as an organisation with with our farm house ha
oh but but from an for using also to to society at large
and it is that which which comes to come to the department resigned indirectly comprise comment which helps reinforce some of those on
security norms of an organisation most of whom dependent annotation which makes home i
think the security landscape a little bit less less hostile and so on
and that that would be the second aspect first the extent of fat the technology threat
because of the internal compliance and i think who sense of sense of an organisation
i think it's an it's an and you will uh had to say of of the yeah one of the
largest um as possible station uh you tell me that you have been hacked into doesn't and sixteen
yeah and you don't have the mean data bank could have to
protect your data and and so how do you had
cope with those new and set up a new risk and that are obviously part of fill your daily activities
uh well um as you said it's well not bank i wish you well bank but uh yeah the um
i think there's a paradigm shift in this part in the spring i
think uh all of you have filed men's because they talking about
a date on this is something we have discussed actually as part of the technical gore uh l.
a. l. today with the other one tarnished federations and now people in spot acknowledge that
uh no data is cooled and uh content is king this is something here
and we need to you i would say even though we all know the bank we need
to acknowledge value that we had the painful expenses you mentioned uh of the hack
and um then people started realising which he wasn't the culture before that actually the
but they tell a wee ho was very important and could calls uh as a
lot of of how so what are we doing as as popping a organisation
to um to protect that will self i think it's
it's starting with education and starting understanding what is
the value of the data and and now i think it's easier for people to understand that
data can be used for uh no it's important for mass engagement
they dated is important for isn't presentation data is important for
anti dumping and and find as well um so data is
mall then default mulder and possibly fifty years ago or twenty years
ago or even ten years ago very important for sports organisations
we don't have the culture or um the money to have an entire department to um
not to protect to to build systems and so on and protect that was off and i think the the the
first that we we took in um when the s. it oration is to understand what well dealing with no
to be able to contain risk in each understand what your billing it i think
it i think the situation false positives is quite difficult because not only you have to deal we've
what we call side often and and when i was walking and not advertising or
no we had the pleasure to do with um a crypt a virus for
example and everyone is facing that type of problems including sports federation
but on top of that we need to deal with what we called a activist all group of interest
um but we also have to the we've which is fairly new uh we've well i could cite doctor
um what we experience for example at the winter olympics where people who
hit the um no some of the systems um they have no
they will not asking for money and we didn't even know who they
were and we also investigating that um so it's changing again
um no the way we need to think outside of subtracted so wait we
need to understand that what all the risk in some of who can
we would like to distract what what we are doing and we need to understand that then you
the signals that you need to understand is you need to assess
what do you need to protect while your most valuable assets
what all the hormones you would get if you get that
type of page of something else because you can all
cover everything so you have to focus first menu all limited when you have limited
funds need to understand what you need to uh go one protect us
so the need to identify assets and the second thing you need to do is you need to focus on
i'm not vulnerabilities because it can be quite wide but well
the most likely facts and we discussed the corpse of
of people who can uh could attack a spot for
action so understanding fights going for the most likely
uh occurrence of a a side door which is is what we need to focus on
and the last part i can mention in term of what would be the
simple step in term of how you outside of socrates think of us
security by design make the right decision to stop we've well then spending going a lot of money
to um no uh to me to get some advice you have created by building a about system
and um no i can give you a very simple examples well i'm not too technical
uh no as we need to be smart and we know and we
need to on price uh for example uh software as a service
uh as a um a something which is all felt was in in our centigrade
and in our case for example wanted to benefit one um software as a service but we
find out the actually the number of people who needed to access that software is limited so we
decided not to expose that typically and protect that who um um
if it can uh uh for the p. and so we
that way we made i will sell more secure all well still benefiting
that that infrastructure and there's a lot of um i would say
simple technique technical decisions you can lie to avoid finding yourself enough
i would position so if you don't want to spend
a lot of money at patch insistence you need to make those decisions uh stuff then
thank you and secured by design actually that's uh you activity day job and i meg
actors to being then either insert some and then one of the leading us
and how a group such as as yours is
getting with those new setup menu security announce
a either from the neophyte acknowledge side what what is your view on that one
so uh never asking is a is a very old company we
we we started off in the the old analogue uh era
uh we became twenty five years ago uh uh entered
into the devaluation became our content security a provider
to not become also when parallel cyber security a provider
uh i heard content is king so obviously um this is one on this to the here
and now we're um data is king as well um can you hear that evan or
uh content generating entity such as illegal or sports
organisation also has issues relating to data
uh we can also we mine uh about the fancy bears thinking
that uh from the uh well the anti dumping organisation
uh association so everything's very mixing we try to put our
skills as his that we have developed over the years
at the service of both the consent orders at the broadcasters as well or for
the major security hands of the banking industry's state organisations for december situation
um now um there's no one seemed about that uh you know
attack vectors are complex uh we speak of multi jurisdictional attackers
and obviously technology is a is a plastic both the content space where
so we'll watch a marking solution you could identify streams been used by the parents
to broadcast a parrot services enhance once you identify them shut them down
uh all the kind of more aggressive customers i available you can also
include consents encrypted signals uh to to better protect them from attackers
but sometimes and even more with the latest apart techniques that this to suffice in itself
hence the legal aspects little being aspects to try to improve to try to complete
the evil of protection that uh we could offer to uh to objects
uh typically sits on a country where we think uh we are the best in class too many demands
uh i think as an example for copyright protection is still a in
the class that that's the classic probably sitting at the last row
the classroom so that's where uh that he can or can try to
improve the situation to the benefit of the white holders for example
thank you bye scale and i would like to open the the the
question and to the public if you have a any and
i do have uh some some question actually and one thing that was kind of a obvious from from
what i understood and there is obviously the the technology side uh which is definitely a key elements
yeah but they seven the human side and and from what we we have seen we cannot do with uh one without the other
and so how do you cope with this part which is so
important twin beds and a safety factor in our habits
within your organisation within the way we we deal with security to make sure that the
human elements is a key part of of succeeding in this new cyber war
and maybe i dunno basket and jump yes you would like to start with the trust factor that you would be to put in place
he is probably an elements uh show very clearly uh there will be
there is are needed to improve on it to increase the level of uh
perception and understanding of what is going on in the digital world
at the population level at large and notably at the love for people to make use of a sport tractors
we see a continuum right between the people who are maybe teenagers
and get equipped with a a wearable devices to measure
their performance in there with their friends and things of that kind that will these data a little bit louder
then two people we're decide to boot will so precise may be seen as we get to
the d. n. a. sequence with these additional very intimate detail out that or actually elected
and then the uh uh uh uh another initiative that it
should be mentioned as well in this framework is what
some uh health insurance companies do nowadays which
and they'd say look if you accept
we're these brass let's uh everyday and prove that you walk your ten thousand
uh you know steps daily then you get to
fifty percent discount on your printed right
so again it's it's it's it's the same kind of a phenomenon
of intimate data being collected it being delivered as such
to whoever is willing to make use of these data what people don't relies very few people know what actually
that though waste a shoe me this is a good idea right which is unclear because it's a way
it's it's a flight on the the solidarity uh uh the little
population but issue me a you want to do that
dot techniques that very well known it could order of yeah that that that are not very complicated
that a lot that makes make it possible to prove
or this level of activity without having to reveal
where this activity to place right it's too with a few modifications
it would be possible to to achieve that it will void exposing everyone's life
because as soon as you expose all the places where you go
essentially your life becomes an open book to those all the people with the perjury to to to read these data
so the ways to prevent this in just to prove that activity uh to
place a that way to protect the data but the problem is
what is going to be the incentive to make this happen right it's incentive to be idle through legislation
right for example the net at the in the connection with the u.
g. d. p. also you know this huge registration that is actually
entering it uh you know parisian in uh actually next week unit throughout the the you
and that will have the deep infants was all the swiss legislation right but those worldwide that is a big big change
so that's one solution it joe solution is it through to the market in such a way that
uh there is enough sensitivity a mock the customers relies that one solution
provides better protection that others she's and we see already somehow
being years of of this kind of revolution in
the behaviour of the i. t. giants z. with how
much effort companies such as the apple or microsoft
uh try to differentiate themselves from this if it's book and it is you don't know we'll we'll do
a a care about your data and we will take all the precautions i will even if needed
uh go to fought against the us government's writings of that kind
so we see we see this evolution of all of the perception of the market
there is kind of a dichotomy between the the guy file which we obviously and sometimes blame for the power and
and the supremacy yeah on on on on the other hand uh the way that we're using and cutting
now a cloud a base platform and through amazon web services
yeah so so there is like this this than and they will and and uh and ensure that we have to to cope with
yeah and and how many to to you had you you you will
make sure that your organisation uh is accepting those new setup
understanding that it's it's a control change and we have to cope with with last corporation from outside of a corporation
about taking care of a security how how did you cope with that how do you
make sure that's his mindset then in the banking industry that is accepting that
so taking example of them beating to the clout as the case might some
not respected possibilities and i get it for eight hours like this isn't
um we have some data in um some of services to pout kind of
think about as well because i have some of the applications in it
that you um
to make sure the dome however even when moving database organisations in today's providers
we make sure that we still may have complete control of it i think even the
keys the encryption keys the data and with the data is encrypted on those services
database think it it was so warm in in in storage to on on on the service and it says that on the keys
if we decided we no longer trusted that platform we disable the keys and well it's it's that
well that would be one of the examples of the unit we have a second example
would be that that platform is not accessible to and from the internet there
is a physical cable connecting credit suisse difficult environment so that yes it is managed
by an external party bit the on the actual data flow is very control
once back over giuseppe regarding the yeah i g. d. p. r. which is anything in nine to false next week
how innovation that as a i have is coping with that what does it mean for you
as a spot of innovation and and how do you kind of change and and and that uh your nation
for that um well i think uh if someone has room as a restricted to uh make that uh
to be compliant in within like a
if we take it to the next a championship of the uh it's i i think it's uh um no we
i i you you were talking about the human element and before i think
people still find to understand um how did you guys impacting what they are doing
and they are all some people still misunderstanding how accountable they all
and pushing the responsibility on their out then does is is is not a
solution because a lot of what needs to change is process related
um so again after i think the um you cannot g. t. are you need
to to the g. d. f. l. inclined we've different sets of data or
and we are far ties in what we need to do for
example of just the everything which is related to medical
data is a party to for us and we need to make sure that we do the right thing it doesn't
no we haven't started with g. g. r. uh so with it it it was
a consent fall but would say that g. d. p. r. use um possibly
giving you the the structure of on the type of things you need to do and uh so that's
uh that's something uh we are building at the i did that fees is looking at parties
the other things we are looking in a in relation with g. d. p. r. e. c.
engagement we've we fans no we we have been collecting for example
simple things as collecting interest fall tickets uh seems the germans on
well no well this is the way you know the the consent form people people
need to acknowledge that we are a store information about that and um and
so they also well not all things we need to do to be compliant of g. d. p. r.
uh and the um it's starting with a very simple things like changing
terms and conditions uh but also in showing that we have
very sexual system that we have a also way of
mark spring break she's one way we have um one of the things we have done is to
i'm a set that what we called a security manage services so basically
uh we have a team of uh no we have a network of
writing centre which is uh well subcontracting to vendor who is
looking at our assets on a twenty four hours a it's seven bases with a
very strict yesterday so that that's the type of things we have been
uh and shading to make sure that we know we are doing the right things from the security on it you know i think we need to do that
as that was mentioned before we need to protect ourself against purple thing no against
a side after hours than all the codes and we should think that this is something we do for
our self rather than just say oh i need to be compliant with something you know that's painful
asking uh any question from from the public to get in
and one one question to you a pascal regarding the the fact that you you mentioned
before and there is the technical elements that needs to be i organise and
set up in a way that is a protection protective uh you know for for
the system that you can element which is coming from enforcing some some roles
yeah how do you uh now i that's why this human false uh in this equation
and how do you cope with that when you you kind of move forward with an annotation to setup was a security missions
um so first professor we bore a set the buzzword g. p. r.
any these uh it does have an effect on the on the human factor we didn't uh decision makers within companies
because now it's not like they want to do something they have to do something
it's it's a phenomenon we we have served in the us uh they had some similar
regulation than these network information security directive that also forced large organisations to take measures
failing which they were we seen big fines um so obviously um you don't
need to uh some supplies uh organisations they have to do something
uh we forgot to human factor however uh obviously need
to prepare a staff for cyber security um incidence
so you have all these preventive measures um prepare
them to react building success for reactive measures
in the in the preventive work uh i would obviously make shore everyone is made of where
uh of what a cyber attack can be already know cyber
awareness and not click on the link uh nor have
tried this tactic necessary measures to avoid a winning if we
i phone clicking and we only cost or two
so v. c. to the work for for with yeah or for for c. so to actually
prepare is troops for for cyber security in for the uh gives the cyber attacks
uh if we take a uh we hear everyday about cyber attacks there's so many the news that it's not even a piece of news
now and uh and we can even realise that when it when you're a victim i mean we have to face became friends of
i don't really see this it doesn't have to be a user was a tutor count all of these have been hacked
over the last figures who cares i think to change your password uh
did you actually take measures as easy as this right yeah so i think there is a lot of work in terms of um
in terms of you know public awareness to be done eventually
they uh even station and without a strict regulations
those people or entities are providing the service did not take the measures
i think you cannot expect users to take them dance themselves
thank you very much and looking at the time i think we will conclude
by uh maybe two measures that will uh you will suggest to do
and from your experience and to to the audience what will be the the top yeah the first
measure you will take other thousand to measure will take to improve and that the cyber security within an organisation
with the normalisation religious bought you mean uh within a yeah yeah well i would i would assume so
so i would say um either it is an organisation that has to manage the data
as my my neighbours here at the end of i would say by enlarge it's
for those interested in the as other companies that have to
protect dieter attended the the measures you've mentioned are
it's a quite standard reasonable measures to be to be uh taken so more specific question is uh
when it is data that are we did it was sport activity that or
oh that's it collected through wearable devices but there's just a you know a highly
specific to this field the l. d.'s to the collection of pretty uh
uh intimidated because the ability of these wearable devices to
provide a actuate measurements is going to improve
right and the hawkers capability in the meantime are not going to diminish its will clearly right so so
clearly the the issue is going to become no one more relevant so my feeling is that
what needs to happen is that it's not just an hackers
is also still devices and so the device manufacturers
have to resist the temptation of being both device sellers
and the data collectors for the purpose of
what the ties the data but there is a mixing of the two which is uh
i think it highly unhealthy it's all there should be pressure
from the legislature and from the market to see we'd we don't want this to happen
either you you company or someone who was a vendor of harbour and then
you've read your your business model is based on selling this hardware and the really the software
or just someone what the ties is the the data but if you do both this would
confusion of role that is very very confusing for the uh for the for the news
i think yeah and maybe one one in it as well to conclude case if we're talking about
the uh no one thing we need to do i would say go for the up
um sometimes not that complicated when i looked at how the uh organisation was hacked
a uh a year ago now um no it could have been avoided we've
possibly not too complicated measure and and usually it's coming i definitely user off all i thought
it was a problem with endpoint security so that's usually a very easy entry point
so make the the right decisions uh around those aspects and
and make sure that you you you do that consistently
thank you and and some us through a satan one like things to be the separation of duties and separation of concerns
so from a and forcing them as opposing instigating a principle when you're accessing data
so for example i could is with the i. t. department would never access commentator actual nevada
on the on the on the people that would be wanting to use that data
there with no problem it would never be keep thinking the code negativity out with instead
of the be touching after two and a you can stay on quite a good
a discussion and argument between the departments to the business owners for example people wanting to use the
data may say you'll be really convenient if you let me download everything in keeping track so
right on the i keep are the id side because i know it's not allowed that that you
can certainly shouldn't be doing that you should be using the two nights with looking for you
the decision concerns and needs no really hope it was a lot of good home made work
i think the mass scale and uh we don't wanna support
contents or prospective uh two points i would recommend first
it sure that's us the content or or sports broadcaster to secure
the content from the source c. of the definition device
so there's an entire channel that you need to stick your using
various technologies so that would be important uh the second
the second tape uh would be that you was the contents owner was a broadcaster and show you can offer
a a user experience to your viewers that makes them want to subscribe
to your services and watch the content you generate rather than
per chairs uh parts are you sure now watch it if they get any
uh to some some parrots service i think bestseller as you understood
it a complex yeah solution there is not a single well to answer the all the the the complexity of it it will be part
half a collaborative uh approach and i think what we think you'll
be grounds for the panelists uh for being today and where

Share this talk: 


Conference program

Welcome Words by David Eades
David Eades
15 May 2018 · 9:06 a.m.
Welcome Words by Philippe Leuba
Phillipe Leuba, Chef du Département de l'Economie et du Sport
15 May 2018 · 9:08 a.m.
Welcome Words by Grégoire Junod
Grégoire Junod
15 May 2018 · 9:13 a.m.
Welcome Words by Benoit Mariani
Benoit Mariani
15 May 2018 · 9:15 a.m.
Hacking the Future
Andy Walshe
15 May 2018 · 9:25 a.m.
Talkback Session: Smart Venues, Moderated by David Eades
Daniel Marion, John Rhodes, Claire Lewis
15 May 2018 · 10:18 a.m.
Talkback Session: Wearables and Data, Moderated by David Eades
Terho Lahtinen, Jean-Christophe Longchampt, Christophe Ramstein, Patrick Schoettker
15 May 2018 · 11:04 a.m.
Talkback Session: Fans and Data, Moderated by Rebecca Hopkins
Horesh Ben Shitrit, Pete Burns, David Lampitt, Clemens Schnellert
15 May 2018 · 11:46 a.m.
Interviews, Moderated by David Eades
Stéphane Guerry, Joey Tan, Olivier Glauser, Albert Mundet
15 May 2018 · 1:45 p.m.
Talkback Session: Machine Learning and AI, Moderated by Jay Stuart
Nicolas Chapart, Nicolas Déal, Johan Vounckx, Mehrsan Javan
15 May 2018 · 2:37 p.m.
Speech
Jochen Färber
15 May 2018 · 3:14 p.m.
Talkback Session: NextGen Video & Engagement, Moderated by Nicolas Henchoz
Christoph Heimes, Spencer Nolan, Pedro Presa, Alexandra Willis
15 May 2018 · 3:30 p.m.
Interview on Security
Earl Crane
15 May 2018 · 4:08 p.m.
Talkback Session: Cyber security and Digital Security, Moderated by Sébastien Kulling
Dang Duy, Thomas Shorrock, Jean-Pierre Hubaux, Simon Trudelle
15 May 2018 · 4:19 p.m.
Introduction of Day 2
David Eades
16 May 2018 · 9:35 a.m.
Social Business and Sport
Muhammad Yunus
16 May 2018 · 9:38 a.m.
Talkback Session: Designer Bodies - Yes or No? Moderated by David Eades
Roland Sigrist, Vincent Gremeaux, Carlos Canto Alvarez, Véronique Lugrin
16 May 2018 · 10:27 a.m.
Talkback Session: Designing for the Future, Moderated by Jay Stuart
Ali Russell, Emilio Risques, Véronique Michaud, Thilo Alex Brunner
16 May 2018 · 11:08 a.m.
Talkback Session: Protection through Innovation, Moderated by Mike Miller
Liam Mc Tiernan, Laurent Mekies, Eric Nauman, Martial Saugy, Mathieu Saubade
16 May 2018 · 12:04 p.m.
From Racing to the Road
Laurent Mekies
16 May 2018 · 1:32 p.m.
Talkback Session: Understanding the eSports Ecosystem, Moderated by Jay Stuart
Brent Barry, Anna Baumann, Julien Delalande, Michael Journot, Carlos "ocelote" Rodriguez Santiago
16 May 2018 · 2:05 p.m.
Talkback Session: What's next in eSports? Moderated by Lars Stegelmann
Brett Abarbanel, Stefan Kuerten, Jan Pommer, Federico Winer
16 May 2018 · 3:05 p.m.
Closing Words
David Eades
16 May 2018 · 4:06 p.m.

Recommended talks

session IM2 Start-up Jamboree: Dev audio
Iain McCowan, DevAudio
1 Sept. 2011 · 6:17 p.m.
Mot de bienvenue
Jean-René Fournier, Conseiller aux Etats, Sion, Suisse
19 Jan. 2012 · 9:11 a.m.