
1 min
GISEC (21-23 March / Dubai)
The FIC will be represented for the first time at GISEC with the constitution of a French delegation and the presence of a French pavilion during the whole event.
January 26, 2022
With more than 7,000 visitors from 70 countries and nearly 200 exhibitors, organised under the patronage of H.E. Dr Mohamed Al-Kuwaiti, Head of Cybersecurity for the UAE Government, GISEC is the leading cybersecurity event in the Middle East. The 2022 edition will take place from 21 to 23 March 2022 at Dubai World Trade Centre.
For further information please contact the FIC team (contact@forum-fic.com).
https://www.gisec.ae/
- Cyber industrial safety
- Security and Stability in Cyberspace
- Cybercrime
- Cyber risks
- Operational security
- Antifraud action
- Digital identity & KYC
- Digital Sovereignty
- Digital transition
27 January 2023
Cybersecurity Maturity in the UAE: A fast and continuous improvement process
The Emirate has been rapidly maturing in the cyber sector, both in the public and private sectors. It took the country only one year (from 2019 to 2020) to move from 33rd to 5th place, according to ...
23 January 2023
How the EU wants to protect citizens and businesses from cyberattacks
The EU Commission wants to ensure that future challenges to the security of digital products in the private environment, but also at companies in the EU, are mastered as well as possible. This should ...
20 January 2023
Everchanging cyberthreats in the energy sector
APT-type attacks, widely covered hacktivist acts, cybercriminal ransomware… Businesses in the energy sector must grasp the extent of the challenges they face.
17 January 2023
The protection of citizens and children on the Internet, a priority issue in 2023
2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our ...
16 January 2023
From Ukraine to Pakistan, a journey to the heart of Internet geopolitics
The Internet is a constrained space, with its own bottlenecks, center and periphery, its land and sea powers. This is one of the conclusions of the colloquium on the geopolitics of Internet routes ...
16 January 2023
[OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)
Covering a wide variety of risks, what are known as “GRC” solutions allow businesses to deal with conventional and emerging risks that affect them, all the while correcting vulnerabilities and ...
Cyber industrial safety
20 January 2023
Everchanging cyberthreats in the energy sector
APT-type attacks, widely covered hacktivist acts, cybercriminal ransomware… Businesses in the energy sector must grasp the extent of the challenges they face.
22 December 2022
Offshore oil and gas: US warns of cyber risk
A report by the Government Accountability Office denounces the obsolescence of software used on many offshore platforms.
08 December 2022
How Europe wants to protect its IT infrastructure in the future
The importance of IT infrastructure is steadily increasing for companies, organizations and entire nations. From the EU’s perspective, a cyber attack on one country can even affect the entire ...
03 November 2022
What are the different cyber threats against solar panels?
DNV provides an update on cyber threats to energy infrastructure, particularly photovoltaic panels
23 September 2022
Israel: pro-Palestine hacktivists hack SCADA/ICS controllers
The GhostSec hacktivist group has claimed it gained control of 55 PLCs at Israeli industrial organisations as part of the “Free Palestine” campaign.
25 July 2022
How can industrial companies ensure the cybersecurity of their supply chain?
Production in industrial companies depends heavily on successful supply chains, as raw materials, materials required for production and usually numerous additional things are necessary to achieve a ...
Security and Stability in Cyberspace
16 January 2023
From Ukraine to Pakistan, a journey to the heart of Internet geopolitics
The Internet is a constrained space, with its own bottlenecks, center and periphery, its land and sea powers. This is one of the conclusions of the colloquium on the geopolitics of Internet routes ...
13 January 2023
US nuclear research labs targeted by Russian cybercriminals
The Cold River group reportedly launched phishing attacks against three research centres in summer 2022, including one specialising in nuclear weaponry
09 January 2023
North Korea: a specialist in cryptocurrency theft
A South Korean intelligence report accuses Pyongyang of stealing $1.2 billion in cryptocurrency since 2017
30 December 2022
The criminal police is entering the Metaverse
In October 2022, the European Criminal Police Agency (Europol) and the International Criminal Police Organization (Interpol) each released their own reports on the Metaverse. Why? They want to enter ...
28 December 2022
Cybersecurity: why Japan is eyeing Europe
Worried about its cybersecurity and being respectful of private data, Japan is urgently seeking the right formula to defend itself. It is looking to Europe, on the verge of creating a “common ...
12 December 2022
Fighting in the Metaverse: a virtual world that is already available to our Army experts
Inform, influence, lure, target, recruit, train. The new virtual, augmented, and hybridized world in the making is generating an ocean of data, which the “earthlings” intend to take ...
Cybercrime
13 January 2023
Free decryption key for MegaCortex
Bitdefender, working with Europol, the Swiss authorities and the No More Ransom project, has made this cyber defence tool available online
22 December 2022
New wiper strikes Russian institutions
Known as “CryWiper”, it’s disguised as ransomware. Its origin is unknown, but its power to cause harm is tremendous.
22 December 2022
Chinese cyber attack on Amnesty International
Secureworks reveals that a spyware spied on the Canadian division of the NGO.
23 November 2022
Canada: Sobeys pharmacies fall victim to a cyberattack
In Canada, the Empire Group, owner of Sobeys pharmacies, suffered a cyber attack that paralyzed the processing of prescriptions.
23 November 2022
LockBit affiliate arrested in Canada
In late October 2022, Europol coordinated the arrest of a Lockbit affiliate in Canada. He is suspected of attacks against critical infrastructure.
03 November 2022
Dutch police trick DeadBolt ransomware gang
By faking ransom payments, the Dutch police and the cybersecurity firm Responders recovered 155 decryption keys from the cybercriminal group DeadBolt
Cyber risks
17 January 2023
The protection of citizens and children on the Internet, a priority issue in 2023
2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our ...
16 January 2023
[OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)
Covering a wide variety of risks, what are known as “GRC” solutions allow businesses to deal with conventional and emerging risks that affect them, all the while correcting vulnerabilities and ...
13 January 2023
Cybercriminals are also using ChatGPT
OpenAI’s chat tool is adept at crafting phishing and malware messages
09 January 2023
Israeli spyware targets security cameras
Sold only to state organisations, it can be used to take control of these cameras and even modify recordings
09 January 2023
Five cyber threats to watch out for in 2023
Triple extortion, attacks on multi-factor authentication (MFA) solutions, the extension of phishing to other types of messaging, browser-based attacks, and the widespread use of AI are the cyber ...
06 January 2023
Layer defences for the best ransomware protection
The best cybersecurity defence strategy is one where there are as many barriers as possible. Even if the hacker breaks through one wall, they will encounter more. Layered defences are the optimal ...
Operational security
13 January 2023
$4.8 million to train cybersecurity experts at the University of Oregon
This National Science Foundation grant is designed to help the US fill its cybersecurity workforce shortage
09 November 2022
Sustainable data destruction: the public sector can do better
Every year, government organizations around the world spend hundreds of millions of dollars on the physical destruction and repurchase of perfectly good IT equipment. Secure data destruction ...
07 November 2022
[EBOOK] Blancco: 3 Guidelines for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies
Discover Blancco’s new ebook for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies through 3 Guidelines: (1) Embrace Change (Management), (2) Commit to Device ...
12 October 2022
[Interview] Gérald Kugler, HP: “Endpoint devices contribute to enterprise resilience”
In order to provide its equipment with security systems that are independent of any third-party editor, the manufacturer HP has built an ambitious strategy. Gérald Kugler, its Chief Technologist ...
11 October 2022
The CISO as a catalyst for cyber awareness among boards of directors
The attacks that have hit many companies in recent years have made executives and their comex aware of the risks involved and the need to take action. The CISO has played a central role in raising ...
20 September 2022
Tips for Effective Leadership During a Cyberattack
Cyberattacks are almost unavoidable now that everyone relies on the internet daily. While they may not be entirely preventable, you can be prepared in case a cyberattack happens to your ...
Antifraud action
09 January 2023
Digital fraud on the rise worldwide
A LexisNexis report shows that bot attacks have increased by 38% (155% in e-commerce) and human attacks by 32%
09 January 2023
USA: Equifax compensates victims of 2017 data breach
Cybercriminals are taking advantage of this large-scale attack to develop new scams
06 January 2023
Stealers in Google sponsored links
Cybercriminals thwart Google’s vigilance by creating a harmless site, which then redirects to a second site containing malicious software
22 December 2022
Beware of CryptosLabs, the champion of brand spoofing
Group-IB warns against the practices of this dreaded “scam-as-a-service” that has automated tools.
23 November 2022
United States: Complaints after skimming of food aid
In the United States, an association filed a complaint against the State of Massachusetts because of its failure to reimburse food aid funds stolen by skimming.
04 November 2022
U.S. banks are failing to reimburse for instant payment fraud
A U.S. senator’s investigation reveals that major U.S. banks rarely reimburse instant payment service fraud
Digital identity & KYC
06 January 2023
Digital identity as a national security priority in Morocco
When detailing his priorities for 2023, the Director General of the Moroccan National Security made a point of focusing on digital technology
06 January 2023
European Digital Identity Wallet: pilot project awarded
EU Digital Identity Wallet consortium to look at application to travel in 2023
06 January 2023
The EU reaches agreement on the legal framework for its digital identity wallets
Digital ministers adopt a regulation guaranteeing interoperable and secure applications.
07 November 2022
[Case Study] Idemia: The Kingdom of Morocco introduces a national digital ID program
The nation puts into effect its digitalization plan based on new eID cards to reinforce security and convenience for citizens. Discover Idemia’s Case Study on the subject, through the ...
04 November 2022
Digital identity: towards the age of reason?
Digital identity players are gradually getting their act together and the European regulatory framework is becoming more structured. Here is a close-up on a market that is gaining in maturity.
11 October 2022
[Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet
The EU is going all in on its Digital Identity Wallet program. A project that is a source of both hope and worry. Digital Identity Wallet advances, protection privacy, international examples, the ...
Digital Sovereignty
23 January 2023
How the EU wants to protect citizens and businesses from cyberattacks
The EU Commission wants to ensure that future challenges to the security of digital products in the private environment, but also at companies in the EU, are mastered as well as possible. This should ...
14 December 2022
NIS2: New year, new European security rules
The heir to the NIS Directive has been adopted. NIS2 introduces far-reaching changes such as C-level criminal liability to ensure that economic actors take digital assets security seriously. ...
24 November 2022
The European Health Data Space : which answers to which questions?
The draft regulation on the European Health Data Space (EHDS) is proposing a framework for sharing health data in Europe. It is questionable whether the legislation will meet the multiple challenges ...
09 November 2022
The Cloud: how do we renew trust?
Europeans have snapped out of their naivety, and they are now looking for the magic formula to secure their data without foregoing the efficiency of apps backed by American datacenters. France has ...
18 October 2022
What is the Health Data Hub all about?
The Health Data Hub is a public entity responsible for simplifying and standardizing access to health data, while ensuring its control and security. It was created on the recommendation of the ...
18 October 2022
The cybersecurity ecosystem fights for European digital sovereignty
Is sovereignty a mission impossible or the Holy Grail of digital technology? Not so much, says Hexatrust, a group of innovative cloud and cybersecurity companies, who presented its “manifesto ...
Digital transition
27 January 2023
Cybersecurity Maturity in the UAE: A fast and continuous improvement process
The Emirate has been rapidly maturing in the cyber sector, both in the public and private sectors. It took the country only one year (from 2019 to 2020) to move from 33rd to 5th place, according to ...
09 January 2023
Canada’s health records are woefully insecure
Report slams the authority responsible for managing British Columbia’s health data sharing platform
13 December 2022
Is Africa the next cyber El Dorado?
Countries that are evolving and becoming aware of cyber issues, an Internet market that is soaring, but also geopolitical issues and major gaps to fill: Africa is a cyber market that is both ...
09 December 2022
Cybersecurity, a new challenge for the construction industry
The use of digital tools, from design offices to maintenance teams, means that smart buildings are exposed to cyber risks. What are these new types of threats? What are the solutions offered by ...
06 December 2022
Ethics and compliance for the younger generation
Regulatory compliance projects and the application of major ethical principles are both highly challenging issues for companies. Attracting the younger generation and mastering all the algorithms ...
22 November 2022
Predictive analytics in cybersecurity: myth or reality?
Companies are finally using a technology that predicts data breaches before they happen — predictive analytics. Like a radar, telling you when an enemy is approaching, predictive analytics is used ...