News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/FI_NA_23_Logotype_White_EN.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • Trust at the heart of data protection regulations: a common thread in Europe and Canada (Quebec)
    Digital transition | Opinions

    Trust at the heart of data protection regulations: a common thread in Europe and Canada (Quebec)

    European, French and Quebec regulations contain everything needed to create a framework of trust among stakeholders when it comes to data governance. But given the challenges of cybersecurity and innovations linked to AI, ...
  • NewSpace: new frontiers and new challenges for cybersecurity
    Security and Stability in Cyberspace | Opinions

    NewSpace: new frontiers and new challenges for cybersecurity

    In 2022, European members of Parliament meeting at the Interparliamentary Conference on Space stated that Europe needed standalone and sustainable access to space. The space sector is clearly an eminently sovereign domain, ...
  • Local authorities declare war on cybercrime
    Cybercrime | Opinions

    Local authorities declare war on cybercrime

    They spend two months looking around your information system. They crash the entire system in two hours. And it takes you two years to recover. The 2-2-2 principle is an apt summary of what cybercriminals do when they attack ...
  • No cybersecurity without soldiers
    Digital transition | Opinions

    No cybersecurity without soldiers

    No battle anywhere has ever been won without soldiers. The fantasy of wars won by drones, remotely controlled with a joystick in one hand and a telephone in the other, just doesn’t stand up against the reality on the ...
  • Cybersecurity: Why we should change our strategy for attracting and retaining talent
    Digital transition | Opinions

    Cybersecurity: Why we should change our strategy for attracting and retaining talent

    Back in 2010, NATO identified cyberspace as a priority for the organization and started a series of reforms to adapt to the new challenge.
  • The CESIN’s (French computer and digital security experts club) yearly barometer: decreasing cyberattacks but ever present cyberthreats
    Cyber risks | Opinions

    The CESIN’s (French computer and digital security experts club) yearly barometer: decreasing cyberattacks but ever present cyberthreats

    With its yearly barometer, the CESIN has been attempting for the last eight years to extricate itself from the anxiety-inducing statistics based on the exponential increase of attacks and millions of euros extorted from ...
  • 2023: the year of cybersecurity in healthcare?
    Cyber risks | Opinions

    2023: the year of cybersecurity in healthcare?

    The shock dates back to November 2019. The leaders of France’s largest hospitals were stunned by the situation at Rouen University Hospital and the international media’s coverage of the event. For the first time, the ...
  • The protection of citizens and children on the Internet, a priority issue in 2023
    Cyber risks | Opinions

    The protection of citizens and children on the Internet, a priority issue in 2023

    2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our weaknesses and ...
  • How to Increase Citizens’ Cybersecurity
    Cyber risks | Opinions

    How to Increase Citizens’ Cybersecurity

    The International Cybersecurity Forum (FIC) Agora white paper “United we stand, divided we fall. Citizens and 21st Century cybersecurity” is timely published. We are living in the age of big data, when more and more ...
  • Bringing trust back to the heart of Artificial Intelligence
    Digital transition | Opinions

    Bringing trust back to the heart of Artificial Intelligence

    For several years now, the companies within the Alliance for Digital Confidence (ACN) have been calling for a French and European vision of Digital Confidence that serves fundamental values and that respects human rights and ...
  • What is the Health Data Hub all about?
    Digital Sovereignty | Opinions

    What is the Health Data Hub all about?

    The Health Data Hub is a public entity responsible for simplifying and standardizing access to health data, while ensuring its control and security. It was created on the recommendation of the renowned Villani mission on ...
  • [Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet
    Digital identity & KYC | Opinions

    [Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet

    The EU is going all in on its Digital Identity Wallet program. A project that is a source of both hope and worry. Digital Identity Wallet advances, protection privacy, international examples, the role of biometrics, the ...
1234>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}