News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/FI_NA_23_Logotype_White_EN.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • No cybersecurity without soldiers
    Digital transition | Opinions

    No cybersecurity without soldiers

    No battle anywhere has ever been won without soldiers. The fantasy of wars won by drones, remotely controlled with a joystick in one hand and a telephone in the other, just doesn’t stand up against the reality on the ...
  • Cybersecurity: Why we should change our strategy for attracting and retaining talent
    Digital transition | Opinions

    Cybersecurity: Why we should change our strategy for attracting and retaining talent

    Back in 2010, NATO identified cyberspace as a priority for the organization and started a series of reforms to adapt to the new challenge.
  • The CESIN’s (French computer and digital security experts club) yearly barometer: decreasing cyberattacks but ever present cyberthreats
    Cyber risks | Opinions

    The CESIN’s (French computer and digital security experts club) yearly barometer: decreasing cyberattacks but ever present cyberthreats

    With its yearly barometer, the CESIN has been attempting for the last eight years to extricate itself from the anxiety-inducing statistics based on the exponential increase of attacks and millions of euros extorted from ...
  • 2023: the year of cybersecurity in healthcare?
    Cyber risks | Opinions

    2023: the year of cybersecurity in healthcare?

    The shock dates back to November 2019. The leaders of France’s largest hospitals were stunned by the situation at Rouen University Hospital and the international media’s coverage of the event. For the first time, the ...
  • The protection of citizens and children on the Internet, a priority issue in 2023
    Cyber risks | Opinions

    The protection of citizens and children on the Internet, a priority issue in 2023

    2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our weaknesses and ...
  • How to Increase Citizens’ Cybersecurity
    Cyber risks | Opinions

    How to Increase Citizens’ Cybersecurity

    The International Cybersecurity Forum (FIC) Agora white paper “United we stand, divided we fall. Citizens and 21st Century cybersecurity” is timely published. We are living in the age of big data, when more and more ...
  • Bringing trust back to the heart of Artificial Intelligence
    Digital transition | Opinions

    Bringing trust back to the heart of Artificial Intelligence

    For several years now, the companies within the Alliance for Digital Confidence (ACN) have been calling for a French and European vision of Digital Confidence that serves fundamental values and that respects human rights and ...
  • What is the Health Data Hub all about?
    Digital Sovereignty | Opinions

    What is the Health Data Hub all about?

    The Health Data Hub is a public entity responsible for simplifying and standardizing access to health data, while ensuring its control and security. It was created on the recommendation of the renowned Villani mission on ...
  • [Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet
    Digital identity & KYC | Opinions

    [Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet

    The EU is going all in on its Digital Identity Wallet program. A project that is a source of both hope and worry. Digital Identity Wallet advances, protection privacy, international examples, the role of biometrics, the ...
  • The manager’s cyber stress is on the rise: how do we reduce it?
    Cyber risks | Opinions

    The manager’s cyber stress is on the rise: how do we reduce it?

    In 2022, a plethora of studies awarded cyber risks the unfortunate title of greatest threat to businesses. While we understand that cybersecurity issues, which are at the heart of managers’ concerns, are a factor of ...
  • Deception as a defensive tool
    Cybercrime | Opinions

    Deception as a defensive tool

    Today, it is clear that cybersecurity is a fight and that its management can easily be considered as warfare. The jargon used is indeed a military one: attackers, campaigns, crisis, strategy, operations etc. A significant ...
  • [FIC 2023 theme] In Cloud we trust?
    Digital transition | Opinions

    [FIC 2023 theme] In Cloud we trust?

    Public cloud computing is driving the digital transformation. With an adoption rate of just 40% in Europe, the market potential for providers and productivity gains for end clients are colossal. However, the choice cannot ...
1234>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}