News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-europe.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • Blockchain and additive manufacturing
    Digital transition | Opinions

    Blockchain and additive manufacturing

    Blockchain and additive manufacturing: two innovations driving the circular economy Circular economy is an alternative to the so-called linear economy. It is aimed at optimising and multiplying the value of the resources by ...
  • Collaboration is the key!
    Operational security | Opinions

    Collaboration is the key!

    Collaboration is the key to successful innovation in automated security Our society has become almost entirely dependent on digitised processes and systems. The threat posed by state actors continues to grow. Countries such ...
  • Towards co-regulation of cyberspace: between power relationship and sovereignty imperatives
    Cyber risks - Digital Sovereignty | Opinions

    Towards co-regulation of cyberspace: between power relationship and sovereignty imperatives

    In almost twenty years, the world has witnessed an explosion of digital technologies. Data has become a primary resource and is at the heart of geopolitical issues – just like any other essential resource. The regulation ...
  • Invalidation of the Privacy Shield: the European Union is up against the wall
    Digital Sovereignty | Opinions

    Invalidation of the Privacy Shield: the European Union is up against the wall

    In a ruling handed down on 16 July 2020 , the Court of Justice of the European Union (CJEU) invalidated a 2016 decision of the European Commission known as the “Privacy Shield” . This “shield” – ...
  • Let’s Protect Our Inventions Together
    Security and Stability in Cyberspace | Opinions

    Let’s Protect Our Inventions Together

    Cybersecurity is a strategic matter for our country. Now more than ever – in our highly, sometimes overly, interconnected world – the question of data protection and of defending our privacy, our health, our ...
  • Who In The World Is Tristan?
    Cyber risks - Operational security | Opinions

    Who In The World Is Tristan?

    We are in 2017. Tristan is hired as Project Manager for a large local authority. This is his very first job and he is determined to make a lasting impression. He is tasked with the implementation of a software package very ...
  • Innovate or Die
    Cyber risks - Digital transition | Opinions

    Innovate or Die

    “Innovate or die”, is a phrase coined by digital transformation enthusiasts for years already.  And it has never been more significant than today. What if the digital revolution innovated at a slightly slower rate? what ...
<1234
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}