News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-europe.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • First Trust & Safety Forum: a cohesive space open to all stakeholders
    Agenda - Event

    First Trust & Safety Forum: a cohesive space open to all stakeholders

    The inaugural edition of the Trust & Safety Forum (T&SF) in Lille, France, on 7 June 2022, takes place at a unique moment, unprecedented in the last two decades, with a wave of new regulations under preparation. With ...
  • Launch of the FIC North America!
    Agenda - Webinar

    Launch of the FIC North America!

    On Wednesday, March 30 from 3:00 pm to 4:30 pm (French local time), the FIC team as well as the main public, private and academic partners will launch the FIC North America and present the project as well as partnership ...
  • [PhilosoFIC research workshop] Is virtuality the reality of tomorrow?
    Digital transition | Agenda

    [PhilosoFIC research workshop] Is virtuality the reality of tomorrow?

    General (2S) François Daoust, Director of the Research Centre of the French Gendarmerie Officers’ School, and General (2S) Marc Watin-Augouard, founder of the FIC, are organising a PhilosoFIC research workshop on ...
  • GISEC (21-23 March / Dubai)
    Agenda

    GISEC (21-23 March / Dubai)

    The FIC will be represented for the first time at GISEC with the constitution of a French delegation and the presence of a French pavilion during the whole event.
  • “Hack CYSAT” challenge: call for ideas opens
    Agenda

    “Hack CYSAT” challenge: call for ideas opens

    CYSEC, organizer of CYSAT—the European event dedicated to cybersecurity for space—launches “Hack CYSAT”, a brand new ethical hacking challenge dedicated to the space industry.
  • Hardware and software obsolescence: a real resilience issue
    Cyber risks | Agenda - Breakfast

    Hardware and software obsolescence: a real resilience issue

    The next inCyber breakfast will take place on Tuesday 30 November, from 8.30am to 10am on the theme: “Hardware and software obsolescence: a real resilience challenge”
  • How to mitigate crypto risks with the right data-driven compliance strategy?
    Cyber risks - Cybercrime | Webinar - Agenda

    How to mitigate crypto risks with the right data-driven compliance strategy?

    The next webinar in partnership with Chainalysis will be held on Wednesday, December 1st, from 6pm to 7pm on the following topic: “How to mitigate crypto risks with the right data-driven compliance strategy?”
  • FIC2022: 1st Scientific Committee
    Agenda

    FIC2022: 1st Scientific Committee

    The 1st meeting of the Scientific Committee was held on Tuesday, October 5. All the members discussed around the main topics: Legal issues – Cybercrime – Cyber risks management – Homeland security and ...
  • Crypto-assets – New technologies can help combat AML/CFT
    Antifraud action - Cyber risks - Cybercrime - Digital Sovereignty | Event -

    Crypto-assets – New technologies can help combat AML/CFT

    While Anti-Money Laundering/Combating the Financing of Terrorism international standards are in place, most jurisdictions have just begun to implement and enforce them. The supervision of crypto-asset service providers ...
  • The ECA is in Lille!
    Cybercrime - Digital Sovereignty - Digital transition | Agenda

    The ECA is in Lille!

    The European Champions Alliance (ECA) is a non-for-profit initiative by a group of passionate entrepreneurs and business development experts who stand for European Tech and values. Our objective is to support the development ...
  • FIC 2021: a triple emergency!
    Agenda

    FIC 2021: a triple emergency!

    In the light of the current health crisis, it was no longer possible to hold the FIC in June. As a result, we have decided to postpone the event for the third time — to 7, 8 and 9 September 2021. While we can still hope ...
  • Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
    Cyber risks - Cybercrime | Agenda

    Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”

    On Wednesday, November 25, 2020, from 8:30 am to 10:00 am, a breakfast has been hold on the theme “Cybersecurity, an asset for corporate communication and marketing?“. The question is not whether a company will ...
<12345>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}