News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-europe.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • Space: learning to reconcile reliability and security
    Cyber risks | Opinions

    Space: learning to reconcile reliability and security

    We all depend on the smooth functioning of the satellites that orbit a few hundred and thousands of kilometres above our heads. Whether it is to help us locate ourselves and find our way, to find out what the weather will be ...
  • All about the metaverse
    Digital transition | Opinions

    All about the metaverse

    If you don’t live on a deserted island without Internet, you have been exposed since this summer—certainly many times—to this new U.S. concept: the metaverse. But what exactly is it?
  • The Dutch Online Trust Coalition on the EUCS
    Digital Sovereignty | Opinions

    The Dutch Online Trust Coalition on the EUCS

    The OTC (Online Trust Coalition) in the Netherlands, a Private-Public partnership of 24 organizations in the Netherlands, have recently expressed their concerns in a recent letter to the EU commission, to ENISA and the EP, ...
  • Alert on the most sensitive ‘STAD’!
    Digital Sovereignty | Opinions -

    Alert on the most sensitive ‘STAD’!

    In 2007, the theme of the 1st FIC was premonitory: “Cybercrime: Crime of the 21st century.” Nearly 15 years later, the facts prove the simultaneous migration of delinquency and conflict between states towards ...
  • Security for SMEs and ETIs from a CISO’s point of view
    Operational security | Opinions

    Security for SMEs and ETIs from a CISO’s point of view

    “Hackers are not interested in us! We have always been able to react!” We often hear these remarks… until one big cyber-attack reminds us of the harsh reality of the cyber fragility of organisations. We realise that ...
  • The transmission of information to the intelligence services
    Cyber risks - Digital Sovereignty - Security and Stability in Cyberspace | Opinions

    The transmission of information to the intelligence services

    Constitutional Council – Decision No. 2021-924 QPC of 9 July 2021, La Quadrature du Net The transmission of information to the intelligence services by the administrative authorities does not comply with the Constitution, ...
  • CFI, a new FIC offshoot dedicated to the security of operational technologies
    Cyber industrial safety - Cyber risks - Digital transition | Business - Opinions

    CFI, a new FIC offshoot dedicated to the security of operational technologies

    By Vincent Riou, Partner at Avisa Partners, and CFI Director Operational technologies (OTs)  are at the heart of our lives. They are used to produce what we consume, transport us, protect us, provide us with energy or clean ...
  • Europe strengthens its cybersecurity
    Digital Sovereignty | Opinions

    Europe strengthens its cybersecurity

    The year 2020 has been rich in terms of EU announcements related to digital transformation. In February-March 2020, at a time when the Covid-19 crisis was dominating people’s minds, the Commission published ...
  • Illegal e-commerce: when neutrality shelters impunity!
    Antifraud action - Digital Sovereignty | Opinions

    Illegal e-commerce: when neutrality shelters impunity!

    An emerging reality twenty years ago, e-commerce is today unavoidable whatever its form, B to C but also C to C and B to B. The pandemic has accentuated this phenomenon even though the regulation of the net has changed ...
  • Security for SMEs and ETIs from a CISO’s point of view
    Operational security | Opinions

    Security for SMEs and ETIs from a CISO’s point of view

    “Hackers are not interested in us! We have always been able to react!” We often hear these remarks… until one big cyber-attack reminds us of the harsh reality of the cyber fragility of organisations. We ...
  • Ransomware: a painful start for 2021
    Cyber risks | Opinions

    Ransomware: a painful start for 2021

    In only three months, the number of cyberattacks registered across the world already amounts to one third of the total figure for 2020. The Emotet threat, eradicated by law enforcement forces earlier this year, has already ...
  • Blockchain and additive manufacturing
    Digital transition | Opinions

    Blockchain and additive manufacturing

    Blockchain and additive manufacturing: two innovations driving the circular economy Circular economy is an alternative to the so-called linear economy. It is aimed at optimising and multiplying the value of the resources by ...
<1234>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}