Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-1-1.svg

The leading
event on Digital security
and trust issues.

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Trainings
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English

Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • + Other topics
    • Cyber industrial safety
    • Antifraud action
    • Digital identity & KYC
  • Fighting deepfakes: a “top priority” for Europol
    Cyber risks

    Fighting deepfakes: a “top priority” for Europol

    A report by the Europol Innovation Lab says that “deepfake prevention and detection” must be “top law enforcement priority.“
  • Cyberattacks and cognitive biases: what are our behaviours?
    Cyber risks

    Cyberattacks and cognitive biases: what are our behaviours?

    A cyberattack often requires the attacker to deploy strategies that are intended to trigger expected reactions from the target. Some of these reactions are governed by cognitive biases.
  • Cybersecurity maturity of large organisations: “Could do better”
    Cyber risks

    Cybersecurity maturity of large organisations: “Could do better”

    There is still room for improvement in this area, as shown by the benchmark carried out by the consultancy firm Wavestone among more than 75 of its clients. It gives them an overall maturity score of 46 out of 100.
  • What cybersecurity for the space sector? Ideas from the CYSAT conference
    Cyber risks

    What cybersecurity for the space sector? Ideas from the CYSAT conference

    Threats to space are increasing. Such is the observation made by many specialists and players in cybersecurity and space at the CYSAT conference held in Paris on 6 and 7 April. At Station F, they reflected on ways to ...
  • ETIs in the face of cyber risk: playing the cyber proximity game
    Cyber risks

    ETIs in the face of cyber risk: playing the cyber proximity game

    Often with little or no protection against cyber risks, intermediate-sized enterprises (aka ETIs) have become prime targets for cybercriminals. Their digital hygiene and their ‘protective measures’ are indeed priorities, ...
  • What place should cybersecurity have in annual reports?
    Cyber risks

    What place should cybersecurity have in annual reports?

    Organisations—whether private or public—are responsible for their computer networks and the data they use. However, the annual reports they publish to present their results and review their activities do not fully ...
  • Collaboration is no longer an option!
    Cyber risks | Opinions

    Collaboration is no longer an option!

    The cyber threat is ubiquitous and CISOs are rather isolated to respond and defend their company.
  • What are the changes in how local authorities consider cybersecurity?
    Cyber risks - Digital transition

    What are the changes in how local authorities consider cybersecurity?

    The health crisis has accelerated the implementation of digital services offered by local authorities to citizens. Their use is only possible in an environment of trust, which is guaranteed by security. Unfortunately, the ...
  • Cybersecurity is only one of the pillars of digital responsibility!
    Cyber risks

    Cybersecurity is only one of the pillars of digital responsibility!

    Cybersecurity requires a risk governance approach and the involvement of all company players: administrators, managers, IT teams and users, including suppliers, subcontractors and partners.
  • What solutions can ensure the cybersecurity of biomedical equipment?
    Cyber risks | Opinions

    What solutions can ensure the cybersecurity of biomedical equipment?

    As the digitisation of health care institutions develops rapidly to meet the needs of both patients and healthcare professionals, the vulnerabilities identified are proportionally increasing, thus leading to a growing risk ...
  • Cybersecurity: top management finally getting their act together
    Cyber risks

    Cybersecurity: top management finally getting their act together

    With the increase in cyberattacks over the last two years, most top managements now seem to have taken the measure of the threat: they are beginning to give CISOs the place and importance they deserve.
  • Does cyber insurance no longer provide insurance?
    Cyber risks | Opinions

    Does cyber insurance no longer provide insurance?

    The insurance world is facing major changes. A few years ago, AXA’s CEO Henri de Castries said: “a world 4 degrees warmer will be impossible to insure.” In recent years, insurance companies have seized the ...
12345…>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2021 BY FIC, INC. ALL RIGHTS RESERVED.
Cyber News and Community
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
I agree that inCyber will process my personal data in accordance with its personal data policy, which I acknowledge having read, and in accordance with the GDPR.
Accept
Change settings
Cookie Box Settings
Cookie Box Settings

Privacy settings

Decide what cookies you want to allow. You can modify these settings at any time. However, this may cause some functions to be no longer available. For more information on deleting cookies, please consult your browser's help function. Learn more about the cookies we use.

With the cursor you can enable or disable different types of cookies:

  • Block all
  • Essential
  • Analytics
  • Advertising

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: do not forget the language version you have selected

This website does not:

  • Remember your login information. Functionality: remember social media settings
  • Feature: Remember the selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings
  • Feature: Remember the selected region and country

This website does not:

  • Remember your login information. Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions

This website does not:

  • Remember your login information. Advertising: Use information for tailor-made advertising with third parties
  • Advertising: allows you to connect to social sites
  • Advertising: Identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Use information for tailor-made advertising with third parties
  • Advertising: Allows you to connect to social sites. Advertising: identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website does not:

  • Remember your login details
Save & Close