News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-europe.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • Crypto-assets – New technologies can help combat AML/CFT
    Antifraud action - Cyber risks - Cybercrime - Digital Sovereignty | Event -

    Crypto-assets – New technologies can help combat AML/CFT

    While Anti-Money Laundering/Combating the Financing of Terrorism international standards are in place, most jurisdictions have just begun to implement and enforce them. The supervision of crypto-asset service providers ...
  • The ECA is in Lille!
    Cybercrime - Digital Sovereignty - Digital transition | Agenda

    The ECA is in Lille!

    The European Champions Alliance (ECA) is a non-for-profit initiative by a group of passionate entrepreneurs and business development experts who stand for European Tech and values. Our objective is to support the development ...
  • FIC 2021: a triple emergency!
    Agenda

    FIC 2021: a triple emergency!

    In the light of the current health crisis, it was no longer possible to hold the FIC in June. As a result, we have decided to postpone the event for the third time — to 7, 8 and 9 September 2021. While we can still hope ...
  • Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
    Cyber risks - Cybercrime | Agenda

    Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”

    On Wednesday, November 25, 2020, from 8:30 am to 10:00 am, a breakfast has been hold on the theme “Cybersecurity, an asset for corporate communication and marketing?“. The question is not whether a company will ...
  • 28/10 – Breakfast: “Invalidation of the Privacy Shield, a chance for Europe”
    Agenda

    28/10 – Breakfast: “Invalidation of the Privacy Shield, a chance for Europe”

    On Wednesday October 28th, 2020, from 8:30 am to 10:00 am, a breakfast has been hold on the theme“Invalidation of the Privacy Shield, a chance for Europe”. On July 16, 2020, the CJEU invalidated the Privacy ...
  • 16/09: “From vulnerability management to risk management”
    Agenda

    16/09: “From vulnerability management to risk management”

    On Wednesday September 16, 2020, from 8:30 am to 10:00 am, a breakfast was held on the theme “From vulnerability management to risk management”. From the definition of security principles and rules (PSSI) to their ...
  • 12/11 – FIC BREAKFAST: “KYC and digital identity: what (r)evolutions?”
    Agenda

    12/11 – FIC BREAKFAST: “KYC and digital identity: what (r)evolutions?”

    The next FIC Observatory breakfast will take place Tuesday, November 12, 2019 in partnership with the ID Forum, on the theme of “KYC and digital identity: what (r)evolutions?“. Pour toute demande d’information ...
  • 29/10 – FIC breakfast: “Is the cybersecurity skills shortage to be feared?”
    Agenda

    29/10 – FIC breakfast: “Is the cybersecurity skills shortage to be feared?”

    The next FIC Observatory breakfast will take place on Tuesday 29th October and will focus on the skills shortage in the cybersecurity sector. Ritchy Cohen (Cyberjobs), Joël Courtois (EPITA), Hugo Lemarchand (Carrefour) and ...
  • 06/09 – FIC BREAKFAST @BRUSSELS: “Cybersecurity: priorities for the incoming European Commission”
    Agenda

    06/09 – FIC BREAKFAST @BRUSSELS: “Cybersecurity: priorities for the incoming European Commission”

    In the framework of the SecDef Forum and the International Cybersecurity Forum (FIC), CEIS is organising a brainstorm on “Cybersecurity: priorities for the incoming European Commission” on September 6th. With a number of ...
  • 10/07 – FIC OBSERVATORY BREAKFAST: “DIGITAL SOVEREIGNTY: THE FRENCH SÉNAT AT WORK”
    Agenda

    10/07 – FIC OBSERVATORY BREAKFAST: “DIGITAL SOVEREIGNTY: THE FRENCH SÉNAT AT WORK”

    To know more about this event, please email us.
  • 21/05 – FIC OBSERVATORY BREAKFAST: Is Lockergoga the new Wannacry ?
    Agenda

    21/05 – FIC OBSERVATORY BREAKFAST: Is Lockergoga the new Wannacry ?

    The talks will be conducted in French. For more details about this event, please visit our French website here.
  • THEMATIC BREAKFAST : LA 5G, ENJEUX POLITIQUES ET INDUSTRIELS D’UNE RÉVOLUTION TECHNOLOGIQUE
    Agenda

    THEMATIC BREAKFAST : LA 5G, ENJEUX POLITIQUES ET INDUSTRIELS D’UNE RÉVOLUTION TECHNOLOGIQUE

    The next thematic breakfast of the FIC Observatory will take place on Tuesday 16th April 2019 on the topic « La 5G, enjeux politiques et industriels d’une révolution technologique ».
<12345>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}