After industrial experience as a network architect, Solange Ghernaouti joined the HEC Faculty of the University of Lausanne in 1987 as the first woman professor, to develop teaching and research in the field of telecommunication networks.
Her passion for teaching and sharing knowledge led to the publication of her first book, “Réseaux, applications réparties normalisées”, by Eyrolles (Paris) in 1990. The last chapter of this book is devoted to the security of distributed applications, and marks the beginning of his research specialization in the security of telecommunication infrastructures and services, and computer and information security.
Solange Ghernaouti has pioneered a transdisciplinary approach to the technical aspects of IT security. This integrates political, economic, legal, social, societal and environmental dimensions, to analyze risks and implement solutions to meet security and defense needs in the age of artificial intelligence. Its work addresses strategic and operational issues in the short, medium and long term.
Under the brand name SCARG – Swiss Cybersecurity Advisory and Research Group – research projects are developed based on a systemic approach to managing the complex risks associated with information technology. The results of this research are also applied to courses and interventions in the fields of cybersecurity, the fight against cybercriminality, cyberdefense, cyberpower and artificial intelligence.
The Swiss non-profit foundation Fondation SGH-Institut de recherche Cybermonde continues these activities and extends them to include philosophical, anthropological and artistic issues. In particular, this independent research institute questions the world we live in, the world we will leave as a legacy to future generations, and the future generations we will leave as a legacy to the planet.
This soberly designed website, kept like a logbook, can be seen as an activity report. It reflects Professor Ghernaouti’s main achievements. It has no other purpose than to indicate the work accomplished, and to help bear witness to the evolution of her approach to the security issues associated with the computerization of society.