News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-europe.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • THEMATIC BREAKFAST : HOW TO CALCULATE THE VALUE OF PERSONAL DATA ?
    Agenda

    THEMATIC BREAKFAST : HOW TO CALCULATE THE VALUE OF PERSONAL DATA ?

    The next thematic breakfast of the FIC Observatory will take place on Tuesday 12th March 2019 on the topic « How to calculate the value of personal data ?».   Arnaud Gressel (RESCO Courtage), Romain Waiss, Associate ...
  • FIC launches a “Strategy Challenge”
    Agenda - Event

    FIC launches a “Strategy Challenge”

    Since 2015, the FIC has held each year technical challenges in digital investigation. This year, it will launch a “strategy challenge” dedicated to strategic thought on the theme of collective security in cyberspace. ...
  • Breakfast Debate “The Resilience Challenge in a Hyperconnected EU”
    Agenda

    Breakfast Debate “The Resilience Challenge in a Hyperconnected EU”

    In the context of the preparation of the upcoming 10th edition of the International Cybersecurity Forum (23-24 January 2018, Lille), CEIS organizes in Brussels a breakfast debate gathering high-level policy-experts in the ...
  • Thematic breakfast: “GDPR and the rise of RegTechs”
    Agenda

    Thematic breakfast: “GDPR and the rise of RegTechs”

    After FinTechs and LegTechs, Regtechs (Regulatory technologies) are becoming the next big thing on the cybersecurity market. Designed to help organizations comply with an increasingly heavy and complex regulation, they offer ...
  • Thematic Breakfast: Quantum Computing: the encryption challenge
    Agenda

    Thematic Breakfast: Quantum Computing: the encryption challenge

    Following the improvement of particles manipulation technics, quantum computing has aroused renewed interest among private and public actors in the last few years. In the meantime, substantial budgets were released to meet ...
  • Thematic Breakfast: How to make smart cities safe and secure ?
    Agenda

    Thematic Breakfast: How to make smart cities safe and secure ?

    Designed as platforms serving citizen’s needs, smart cities rely on ever more powerful and interconnected networks of all kinds combining infrastructures, digital services and information systems, in a bid to collect and ...
  • Thematic Breakfast: Uberisation: What role for trusted third parties in terms of security and digital trust ?
    Agenda

    Thematic Breakfast: Uberisation: What role for trusted third parties in terms of security and digital trust ?

    The next thematic breakfast will take place on Tuesday 28th March on the theme: “Uberisation: what role for trusted third parties in terms of security and digital trust ? “ Uberisation, at the heart of digital ...
  • Thematic Breakfast : Which opportunities for the French digital and cybersecurity industries in Africa ?
    Agenda

    Thematic Breakfast : Which opportunities for the French digital and cybersecurity industries in Africa ?

    The next thematic breakfast of the FIC Observatory will take place on Wednesday 1st March 2017 on the topic « Which opportunities for the French digital and cybersecurity industries in Africa ? »   The African ...
  • Thematic Breakfast: Incident Response: How far can automatisation go ? 
    Agenda

    Thematic Breakfast: Incident Response: How far can automatisation go ? 

    The next Thematic Breakfast will take place on Thursday 15th September on the theme « Incident Response: how far can automatisation go ? » Automising incident response appears like a promising solution to face the ...
  • Thematic Breakfast : “The protection of personal data: a new competitive advantage”
    Agenda

    Thematic Breakfast : “The protection of personal data: a new competitive advantage”

    The next Breakfast of the Observatory will take place on Tuesday 7th June with the theme “The protection of personal data: a new competitive advantage” ?    In coming months, CISOs will be ...
  • Thematic Breakfast – 24 May 2016: Integrators and users: how to find a customised cyber solution? Become an experimenter.
    Agenda

    Thematic Breakfast – 24 May 2016: Integrators and users: how to find a customised cyber solution? Become an experimenter.

    Originally seen as a cost centre, strengthening the security of a hardware product, software product or solution may become a source of added value or market differentiation for an industrial company’s ...
  • Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
    Agenda

    Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »

    Even as more than 80% of cyber attacks target the application layer, a lot of businesses primarily invest in infrastructure and access protection. Three initiatives must be carried out in order to effectively tighten ...
<12345>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}