Image Cybersecurity: Siemens’ Commitment
01.22.20
Cybersecurity: Siemens’ Commitment
Read
03
MIN
Image Ransomware in Six Questions
Secops
01.22.20 Secops
Ransomware in Six Questions
Read
03
MIN
Image Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Secops
01.22.20 Secops
Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Read
07
MIN
Image Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Risks management
01.22.20 Risks management
Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Read
04
MIN
Image How the SPARTA Network strengthens EU’s cybersecurity capacities
Cyber stability
01.22.20 Cyber stability
How the SPARTA Network strengthens EU’s cybersecurity capacities
Read
05
MIN
Image Towards European digital sovereignty (by DG Connect, European Commission)
12.23.19
Towards European digital sovereignty (by DG Connect, European Commission)
Read
03
MIN
Image Social science and cybersecurity: a key challenge for the future
Digital transformation
Social science and cybersecurity: a key challenge for the future
Read
03
MIN
Image Why cybersecurity is a human rights issue, and it is time to start treating it like one (by Deborah Brown & Anriette Esterhuysen, Association for progressive communications)
Digital Sovereignty
Why cybersecurity is a human rights issue, and it is time to start treating it like one (by Deborah Brown & Anriette Esterhuysen, Association for progressive communications)
Read
13
MIN
Image Idiap becomes first non-US site of the Center for Identification Technology Research
Risks management
12.20.19 Risks management
Idiap becomes first non-US site of the Center for Identification Technology Research
Read
03
MIN
Image Using differential privacy to protect privacy
Secops
12.20.19 Secops
Using differential privacy to protect privacy
Read
05
MIN
Image Local authorities in midstream (by Agnès Le Brun, Vice President of the Association of Mayors of France)
12.03.19
Local authorities in midstream (by Agnès Le Brun, Vice President of the Association of Mayors of France)
Read
03
MIN
Image Hewlett Foundation will be attending FIC 2020
Cyber +
12.03.19 Cyber +
Hewlett Foundation will be attending FIC 2020
Read
04
MIN
Image The Policeman Was On A Walk Through The Files
Cybercrime
12.03.19 Cybercrime
The Policeman Was On A Walk Through The Files
Read
04
MIN
Image The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Risks management
12.03.19 Risks management
The effects of a data breach: Loss of brand reputation and financial penalties (by Seref Can OZKAYA)
Read
07
MIN
Image 12/11 – FIC BREAKFAST: "KYC and digital identity: what (r)evolutions?"
10.29.19
12/11 – FIC BREAKFAST: “KYC and digital identity: what (r)evolutions?”
Read
01
MIN
Image Cyber News: a new media entirely dedicated to cybersecurity (by the FIC team)
10.29.19
Cyber News: a new media entirely dedicated to cybersecurity (by the FIC team)
Read
02
MIN
Image 29/10 – FIC breakfast: “Is the cybersecurity skills shortage to be feared?”
10.28.19
29/10 – FIC breakfast: “Is the cybersecurity skills shortage to be feared?”
Read
01
MIN
Image Digital Identity - Europe vs. the United States of America - The Game is not Over
Digital Sovereignty
Digital Identity – Europe vs. the United States of America – The Game is not Over
Read
06
MIN
Image A Release of Digital Hostages?
Risks management
10.28.19 Risks management
A Release of Digital Hostages?
Read
05
MIN
Image October 2019: the FIC, partner of the European Cybersecurity Month
09.19.19
October 2019: the FIC, partner of the European Cybersecurity Month
Read
01
MIN
Image 10 good reasons to set up a cybersecurity company in Switzerland (by the GGBa)
Digital Sovereignty
10 good reasons to set up a cybersecurity company in Switzerland (by the GGBa)
Read
04
MIN