Ethics and compliance for the younger generation
Digital transition

Ethics and compliance for the younger generation

By Fabrice Deblock
Regulatory compliance projects and the application of major ethical principles are both highly challenging issues for companies. Attracting the younger generation and mastering all the algorithms from start to finish are two major challenges.

Agenda

  • October, 25 2023 - October, 26 2023 [Agenda][Event]

    SAVE THE DATE FIC North America – October 25 and 26, 2023

    Organised by Avisa Partners, the 1st edition of the International Cybersecurity Forum North America (ICF) was held on November 1st and 2nd at the Palais des Congrès in Montreal. It ended under the sign of the convergence of ...
  • October, 14 2022 - November, 21 2022 [Agenda]

    FIC Startup Award: registration is open!

    Registration for the FIC 2023 Startup Award is now open. This award, which aims to encourage innovation and entrepreneurship in the security, digital trust and industrial cybersecurity sectors, rewards several innovative ...
  • November, 01 2022 - November, 02 2022 [Agenda][Event]

    FIC North America: the programme in a nutshell

    The first edition of the FIC North America will be held at the Palais des Congrès of Montreal on November 1st and 2nd. On this occasion, several formats are expected: plenary sessions, conferences and panels. inCyber offers ...
+

Vidéos

  • Cyber industrial safety
  • Security and Stability in Cyberspace
  • Cybercrime
  • Cyber risks
  • Operational security
  • Antifraud action
  • Digital identity & KYC
  • Digital Sovereignty
  • Digital transition
Cyber industrial safety
What are the different cyber threats against solar panels?
03 November 2022

What are the different cyber threats against solar panels?

DNV provides an update on cyber threats to energy infrastructure, particularly photovoltaic panels
Israel: pro-Palestine hacktivists hack SCADA/ICS controllers
23 September 2022

Israel: pro-Palestine hacktivists hack SCADA/ICS controllers

The GhostSec hacktivist group has claimed it gained control of 55 PLCs at Israeli industrial organisations as part of the “Free Palestine” campaign.
How can industrial companies ensure the cybersecurity of their supply chain?
25 July 2022

How can industrial companies ensure the cybersecurity of their supply chain?

By Thomas Joos
Production in industrial companies depends heavily on successful supply chains, as raw materials, materials required for production and usually numerous additional things are necessary to achieve a ...
Biometric authentication: a model to follow?
25 July 2022

Biometric authentication: a model to follow?

By Thomas Joos
Many industrial organisations use authentication methods to provide access to specific locations or to log into computers and services. On the flip side, 79% of organisations have experienced an ...
Black Basta ransomware: an emerging threat
18 July 2022

Black Basta ransomware: an emerging threat

The RaaS group Black Basta has reportedly claimed nearly 50 victims in the two months of its existence.
U.S.: $12m for cybersecurity research in the energy sector
01 June 2022

U.S.: $12m for cybersecurity research in the energy sector

The U.S. Department of Energy is awarding a $12 million grant to six university research teams working on the cybersecurity of energy systems.
Security and Stability in Cyberspace
Cybersecurity: France’s international reputation is on the rise
05 December 2022

Cybersecurity: France’s international reputation is on the rise

By Fabrice Deblock
France’s cybersecurity strategy is growing year after year, with major initiatives and budgets. This strategy is perceived positively by its partners.
Submarine cables: the future of the Internet is under the sea
24 November 2022

Submarine cables: the future of the Internet is under the sea

By Richard Dalleau
The 2Africa submarine mega-cable was recently connected to Marseille. This pharaonic project illustrates the geopolitical, economic, and political stakes of this little-known face of the Internet. In ...
France wants to develop a “world-class” cyber defense
23 November 2022

France wants to develop a “world-class” cyber defense

In his presentation of the “National Strategic Review” 2022, Emmanuel Macron stated that France must have, within 5 years, “a world-class cyber defense.”
Behind the scenes of Israel’s cyber power
15 November 2022

Behind the scenes of Israel’s cyber power

By Pascal Coillet-Matillon
Back in 2010 Prime Minister Benyamin Netanyahu had one objective: to make his country one of the world’s leading cyber powers. A mission many today would deem accomplished! Mostly thanks to the ...
German cybersecurity chief accused of colluding with Russia
03 November 2022

German cybersecurity chief accused of colluding with Russia

Germany may soon dismisses Arne Schönbohm, president of the federal cybersecurity agency, for alleged connections with Russia
Canada hit by 75 geopolitical cyber-incidents since 2010
28 September 2022

Canada hit by 75 geopolitical cyber-incidents since 2010

UQAM has published a study of the 75 geopolitical or strategic cyber incidents that Canada has experienced since 2010
Cybercrime
Canada: Sobeys pharmacies fall victim to a cyberattack
23 November 2022

Canada: Sobeys pharmacies fall victim to a cyberattack

In Canada, the Empire Group, owner of Sobeys pharmacies, suffered a cyber attack that paralyzed the processing of prescriptions.
LockBit affiliate arrested in Canada
23 November 2022

LockBit affiliate arrested in Canada

In late October 2022, Europol coordinated the arrest of a Lockbit affiliate in Canada. He is suspected of attacks against critical infrastructure.
Dutch police trick DeadBolt ransomware gang
03 November 2022

Dutch police trick DeadBolt ransomware gang

By faking ransom payments, the Dutch police and the cybersecurity firm Responders recovered 155 decryption keys from the cybercriminal group DeadBolt
The real threat of unconventional cyberattacks
17 October 2022

The real threat of unconventional cyberattacks

By Thomas Joos
Hackers and other cybercriminals are constantly looking for new ways to breach the security infrastructure of corporations and organizations and attack their networks, especially power and utility ...
Online bank Revolut suffers data breach
28 September 2022

Online bank Revolut suffers data breach

Data belonging to 32,000 clients of British online bank Revolut was stolen, apparently without impact on deposits
Deception as a defensive tool
19 September 2022

Deception as a defensive tool

By Christophe Auberger
Today, it is clear that cybersecurity is a fight and that its management can easily be considered as warfare. The jargon used is indeed a military one: attackers, campaigns, crisis, strategy, ...
Cyber risks
The cyber insurance market’s search for maturity
15 November 2022

The cyber insurance market’s search for maturity

By Fabrice Deblock
The young cyber insurance market is trying to find its bearings, which implies fluctuations in price and in the content of its contracts. This instability may discourage some big businesses from ...
Agricultural data security: a doubly strategic issue
19 October 2022

Agricultural data security: a doubly strategic issue

By Fabrice Deblock
There are two main challenges that accompany digitalisation of the agricultural sector: protecting data from cybercrime attacks, on the one hand, and creating a climate of trust with data-collecting ...
Ransomware – Crisis Management at the Heart of Resilience
10 October 2022

Ransomware – Crisis Management at the Heart of Resilience

By Marc Auxenfants
For many companies, anticipating and protecting themselves from ransomware attacks is limited to technological and IT security strategies. Nowadays, however, the stakes are much higher as ...
The manager’s cyber stress is on the rise: how do we reduce it?
26 September 2022

The manager’s cyber stress is on the rise: how do we reduce it?

By Maurice Benzaquen
In 2022, a plethora of studies awarded cyber risks the unfortunate title of greatest threat to businesses. While we understand that cybersecurity issues, which are at the heart of managers’ ...
Twitter: “extreme deficiencies” in security
23 September 2022

Twitter: “extreme deficiencies” in security

Peiter Zatko, former security director at Twitter, has reported serious security failures at the social network. These revelations could have significant consequences.
Tips for Effective Leadership During a Cyberattack
20 September 2022

Tips for Effective Leadership During a Cyberattack

By Zachary Amos
Cyberattacks are almost unavoidable now that everyone relies on the internet daily. While they may not be entirely preventable, you can be prepared in case a cyberattack happens to your ...
Operational security
Sustainable data destruction: the public sector can do better
09 November 2022

Sustainable data destruction: the public sector can do better

By Marc Auxenfants
Every year, government organizations around the world spend hundreds of millions of dollars on the physical destruction and repurchase of perfectly good IT equipment. Secure data destruction ...
[EBOOK] Blancco: 3 Guidelines for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies
07 November 2022

[EBOOK] Blancco: 3 Guidelines for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies

Discover Blancco’s new ebook for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies through 3 Guidelines: (1) Embrace Change (Management), (2) Commit to Device ...
[Interview] Gérald Kugler, HP: “Endpoint devices contribute to enterprise resilience”
12 October 2022

[Interview] Gérald Kugler, HP: “Endpoint devices contribute to enterprise resilience”

By Fabrice Deblock
In order to provide its equipment with security systems that are independent of any third-party editor, the manufacturer HP has built an ambitious strategy. Gérald Kugler, its Chief Technologist ...
The CISO as a catalyst for cyber awareness among boards of directors
11 October 2022

The CISO as a catalyst for cyber awareness among boards of directors

By Fabrice Deblock
The attacks that have hit many companies in recent years have made executives and their comex aware of the risks involved and the need to take action. The CISO has played a central role in raising ...
Tips for Effective Leadership During a Cyberattack
20 September 2022

Tips for Effective Leadership During a Cyberattack

By Zachary Amos
Cyberattacks are almost unavoidable now that everyone relies on the internet daily. While they may not be entirely preventable, you can be prepared in case a cyberattack happens to your ...
2022 FIFA World Cup: Qatar’s Cybersecurity Measures
16 September 2022

2022 FIFA World Cup: Qatar’s Cybersecurity Measures

By Antoun Beyrouthy
On the 2nd of December 2010, FIFA president Sepp Blatter announced that the FIFA World Cup 2022 will be held in Qatar. Accordingly, the small Gulf Cooperation Council (GCC) member state would have ...
Antifraud action
United States: Complaints after skimming of food aid
23 November 2022

United States: Complaints after skimming of food aid

In the United States, an association filed a complaint against the State of Massachusetts because of its failure to reimburse food aid funds stolen by skimming.
U.S. banks are failing to reimburse for instant payment fraud
04 November 2022

U.S. banks are failing to reimburse for instant payment fraud

A U.S. senator’s investigation reveals that major U.S. banks rarely reimburse instant payment service fraud
Joe Biden’s plan to regulate digital assets
28 September 2022

Joe Biden’s plan to regulate digital assets

The new framework on digital assets presented by the White House seeks to facilitate financial transactions and crack down on fraud
A phishing campaign from a legitimate PayPal Business account
23 September 2022

A phishing campaign from a legitimate PayPal Business account

A recent investigation revealed the mechanics of a sophisticated phishing attack using emails sent from a legitimate PayPal address.
First arrest for insider trading in NFTs
18 July 2022

First arrest for insider trading in NFTs

The FBI has arrested the former product manager of an NFT sales platform who allegedly took advantage of his position to buy crypto-assets before their value rose.
USA: 5 years in prison for an Estonian hacker specialising in financial fraud
11 April 2022

USA: 5 years in prison for an Estonian hacker specialising in financial fraud

A U.S. court has sentenced Maksim Berezan, an Estonian cybercriminal involved in 13 ransomware attacks and numerous financial frauds, to five years in prison.
Digital identity & KYC
[Case Study] Idemia: The Kingdom of Morocco introduces a national digital ID program
07 November 2022

[Case Study] Idemia: The Kingdom of Morocco introduces a national digital ID program

The nation puts into effect its digitalization plan based on new eID cards to reinforce security and convenience for citizens. Discover Idemia’s Case Study on the subject, through the ...
Digital identity: towards the age of reason?
04 November 2022

Digital identity: towards the age of reason?

By Fabrice Deblock
Digital identity players are gradually getting their act together and the European regulatory framework is becoming more structured. Here is a close-up on a market that is gaining in maturity.
[Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet
11 October 2022

[Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet

By Richard Dalleau
The EU is going all in on its Digital Identity Wallet program. A project that is a source of both hope and worry. Digital Identity Wallet advances, protection privacy, international examples, the ...
Biometric authentication: a model to follow?
25 July 2022

Biometric authentication: a model to follow?

By Thomas Joos
Many industrial organisations use authentication methods to provide access to specific locations or to log into computers and services. On the flip side, 79% of organisations have experienced an ...
Getting Back Our Digital Identity – A Moonshot Proposal
24 May 2022

Getting Back Our Digital Identity – A Moonshot Proposal

By Patrick W. Hearn
American digital identity has rocketed away from us. Since the 1990’s, it has been used by organizations who have treated us as nothing more than money-making data fields. It is time for Americans ...
How digital KYC is transforming business
16 May 2022

How digital KYC is transforming business

By Marc Auxenfants
Formerly used to combat money laundering, “know your customer” (KYC) is expanding its scope and recurrence to become cyber-resilient. Previously a characteristic of the financial sector alone, ...
Digital Sovereignty
The European Health Data Space : which answers to which questions?
24 November 2022

The European Health Data Space : which answers to which questions?

By Rayna Stamboliyska
The draft regulation on the European Health Data Space (EHDS) is proposing a framework for sharing health data in Europe. It is questionable whether the legislation will meet the multiple challenges ...
The Cloud: how do we renew trust?
09 November 2022

The Cloud: how do we renew trust?

By Mériadec Raffray
Europeans have snapped out of their naivety, and they are now looking for the magic formula to secure their data without foregoing the efficiency of apps backed by American datacenters. France has ...
What is the Health Data Hub all about?
18 October 2022

What is the Health Data Hub all about?

By Valentin Przyluski
The Health Data Hub is a public entity responsible for simplifying and standardizing access to health data, while ensuring its control and security. It was created on the recommendation of the ...
The cybersecurity ecosystem fights for European digital sovereignty
18 October 2022

The cybersecurity ecosystem fights for European digital sovereignty

By Patricia Dreidemy
Is sovereignty a mission impossible or the Holy Grail of digital technology? Not so much, says Hexatrust, a group of innovative cloud and cybersecurity companies, who presented its “manifesto ...
Trustworthy AI: from certification to standardization
14 October 2022

Trustworthy AI: from certification to standardization

By Xavier Biseul
In anticipation of the future European regulatory framework, the AI Act, there has been a proliferation of initiatives and labels promoting ethical and responsible artificial intelligence. A ...
[Europe calling] Is Resilience Within Reach?
09 September 2022

[Europe calling] Is Resilience Within Reach?

By Rayna Stamboliyska
The Cyber Resilience Act will be published in the near future. Beyond the term “resilience”, the meaning of which has been somewhat corrupted recently, one question remains. In a world where ...
Digital transition
Ethics and compliance for the younger generation
06 December 2022

Ethics and compliance for the younger generation

By Fabrice Deblock
Regulatory compliance projects and the application of major ethical principles are both highly challenging issues for companies. Attracting the younger generation and mastering all the algorithms ...
Predictive analytics in cybersecurity: myth or reality?
22 November 2022

Predictive analytics in cybersecurity: myth or reality?

By Zachary Amos
Companies are finally using a technology that predicts data breaches before they happen — predictive analytics. Like a radar, telling you when an enemy is approaching, predictive analytics is used ...
Bringing trust back to the heart of Artificial Intelligence
06 November 2022

Bringing trust back to the heart of Artificial Intelligence

By Daniel Le Coguic
For several years now, the companies within the Alliance for Digital Confidence (ACN) have been calling for a French and European vision of Digital Confidence that serves fundamental values and that ...
Manitoba lacks health data protection in Canada
03 November 2022

Manitoba lacks health data protection in Canada

A new report exposes the poor level of protection of patient health data in the province of Manitoba, Canada
[Questions about the metaverse. Episode 2]. How can we regulate toxic behaviour?
06 October 2022

[Questions about the metaverse. Episode 2]. How can we regulate toxic behaviour?

By Xavier Biseul
With hate speech and aggressive behaviour, new immersive worlds are, unsurprisingly, reproducing real-world abuse. With their future at stake, platforms are implementing moderation strategies that ...
Cybersecurity: everyone’s business!
27 September 2022

Cybersecurity: everyone’s business!

By Jacques Pommeraud
Talk about ramping up the digital revolution! A leading business newspaper headline stated two years ago that “lockdown had broken down the last remaining barriers of the digital ...

Our
partners