News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/FI_NA_23_Logotype_White_EN.png

The leading
event on Digital security
and trust issues

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Talents
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
News and Cyber Community
  • Contributors
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
inCyber
  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • CFI, a new FIC offshoot dedicated to the security of operational technologies
    Cyber industrial safety - Cyber risks - Digital transition | Business - Opinions

    CFI, a new FIC offshoot dedicated to the security of operational technologies

    By Vincent Riou, Partner at Avisa Partners, and CFI Director Operational technologies (OTs)  are at the heart of our lives. They are used to produce what we consume, transport us, protect us, provide us with energy or clean ...
  • Europe strengthens its cybersecurity
    Digital Sovereignty | Opinions

    Europe strengthens its cybersecurity

    The year 2020 has been rich in terms of EU announcements related to digital transformation. In February-March 2020, at a time when the Covid-19 crisis was dominating people’s minds, the Commission published ...
  • Illegal e-commerce: when neutrality shelters impunity!
    Antifraud action - Digital Sovereignty | Opinions

    Illegal e-commerce: when neutrality shelters impunity!

    An emerging reality twenty years ago, e-commerce is today unavoidable whatever its form, B to C but also C to C and B to B. The pandemic has accentuated this phenomenon even though the regulation of the net has changed ...
  • Security for SMEs and ETIs from a CISO’s point of view
    Operational security | Opinions

    Security for SMEs and ETIs from a CISO’s point of view

    “Hackers are not interested in us! We have always been able to react!” We often hear these remarks… until one big cyber-attack reminds us of the harsh reality of the cyber fragility of organisations. We ...
  • Ransomware: a painful start for 2021
    Cyber risks | Opinions

    Ransomware: a painful start for 2021

    In only three months, the number of cyberattacks registered across the world already amounts to one third of the total figure for 2020. The Emotet threat, eradicated by law enforcement forces earlier this year, has already ...
  • Blockchain and additive manufacturing
    Digital transition | Opinions

    Blockchain and additive manufacturing

    Blockchain and additive manufacturing: two innovations driving the circular economy Circular economy is an alternative to the so-called linear economy. It is aimed at optimising and multiplying the value of the resources by ...
  • Collaboration is the key!
    Operational security | Opinions

    Collaboration is the key!

    Collaboration is the key to successful innovation in automated security Our society has become almost entirely dependent on digitised processes and systems. The threat posed by state actors continues to grow. Countries such ...
  • Towards co-regulation of cyberspace: between power relationship and sovereignty imperatives
    Cyber risks - Digital Sovereignty | Opinions

    Towards co-regulation of cyberspace: between power relationship and sovereignty imperatives

    In almost twenty years, the world has witnessed an explosion of digital technologies. Data has become a primary resource and is at the heart of geopolitical issues – just like any other essential resource. The regulation ...
  • Invalidation of the Privacy Shield: the European Union is up against the wall
    Digital Sovereignty | Opinions

    Invalidation of the Privacy Shield: the European Union is up against the wall

    In a ruling handed down on 16 July 2020 , the Court of Justice of the European Union (CJEU) invalidated a 2016 decision of the European Commission known as the “Privacy Shield” . This “shield” – ...
  • Let’s Protect Our Inventions Together
    Security and Stability in Cyberspace | Opinions

    Let’s Protect Our Inventions Together

    Cybersecurity is a strategic matter for our country. Now more than ever – in our highly, sometimes overly, interconnected world – the question of data protection and of defending our privacy, our health, our ...
  • Who In The World Is Tristan?
    Cyber risks - Operational security | Opinions

    Who In The World Is Tristan?

    We are in 2017. Tristan is hired as Project Manager for a large local authority. This is his very first job and he is determined to make a lasting impression. He is tasked with the implementation of a software package very ...
  • Innovate or Die
    Cyber risks - Digital transition | Opinions

    Innovate or Die

    “Innovate or die”, is a phrase coined by digital transformation enthusiasts for years already.  And it has never been more significant than today. What if the digital revolution innovated at a slightly slower rate? what ...
<1234
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2022 BY FIC, INC. ALL RIGHTS RESERVED.
News and Cyber Community
  • Events
  • Talents
  • Nominees
  • Business
  • Opinion
  • Publications
  • Videos
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
Manage cookie consent
Pour offrir les meilleures expériences, nous utilisons des technologies telles que les cookies pour stocker et/ou accéder aux informations des appareils. Le fait de consentir à ces technologies nous permettra de traiter des données telles que le comportement de navigation ou les ID uniques sur ce site. Le fait de ne pas consentir ou de retirer son consentement peut avoir un effet négatif sur certaines caractéristiques et fonctions.
Fonctionnel Always active
Le stockage ou l’accès technique est strictement nécessaire dans la finalité d’intérêt légitime de permettre l’utilisation d’un service spécifique explicitement demandé par l’abonné ou l’utilisateur, ou dans le seul but d’effectuer la transmission d’une communication sur un réseau de communications électroniques.
Préférences
Storage or technical access is necessary for the purpose of legitimate interest to store preferences that are not requested by the subscriber or user.
Statistiques
Le stockage ou l’accès technique qui est utilisé exclusivement à des fins statistiques. Le stockage ou l’accès technique qui est utilisé exclusivement dans des finalités statistiques anonymes. En l’absence d’une assignation à comparaître, d’une conformité volontaire de la part de votre fournisseur d’accès à internet ou d’enregistrements supplémentaires provenant d’une tierce partie, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l’accès technique est nécessaire pour créer des profils d’utilisateurs afin d’envoyer des publicités, ou pour suivre l’utilisateur sur un site web ou sur plusieurs sites web ayant des finalités marketing similaires.
Manage options Manage services Manage vendors Read more about these purposes
Voir les préférences
{title} {title} {title}