Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-1-1.svg

The leading
event on Digital security
and trust issues.

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Trainings
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English

Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • + Other topics
    • Cyber industrial safety
    • Antifraud action
    • Digital identity & KYC
  • Cybersecurity: CISOs at the heart of the action
    Cyber risks - Digital transition - Operational security

    Cybersecurity: CISOs at the heart of the action

    CISOs are no longer the technical experts they had often been and still have the image of. They must now approach cybersecurity from multiple angles: technical, of course, but also operational, legal, insurance, ...
  • Crypto-assets – New technologies can help combat AML/CFT
    Antifraud action - Cyber risks - Cybercrime - Digital Sovereignty | Event -

    Crypto-assets – New technologies can help combat AML/CFT

    While Anti-Money Laundering/Combating the Financing of Terrorism international standards are in place, most jurisdictions have just begun to implement and enforce them. The supervision of crypto-asset service providers ...
  • NIS 2: towards a European cyber security shield
    Cyber risks - Digital Sovereignty

    NIS 2: towards a European cyber security shield

    The revised NIS Directive: a critical introduction to the EU’s cybersecurity strategy and rules With the revision of the NIS directive or “NIS 2”, the EU Commission proposes to reshape the rules on network and ...
  • The transmission of information to the intelligence services
    Cyber risks - Digital Sovereignty - Security and Stability in Cyberspace | Opinions

    The transmission of information to the intelligence services

    Constitutional Council – Decision No. 2021-924 QPC of 9 July 2021, La Quadrature du Net The transmission of information to the intelligence services by the administrative authorities does not comply with the Constitution, ...
  • “The question is no longer whether we can fall but how to overcome such an event”
    Cyber industrial safety - Cyber risks - Cybercrime - Digital transition

    “The question is no longer whether we can fall but how to overcome such an event”

    Thierry Trouvé, CEO of GRTgaz describes the initiatives that the French gas transport system operator is putting in place to protect its industrial systems (OTs) from the main risks it faces, whether traditional or ...
  • Resilience of critical infrastructures: A sovereignty issue
    Cyber industrial safety - Cyber risks - Security and Stability in Cyberspace

    Resilience of critical infrastructures: A sovereignty issue

    On 4 June, the FIC, in partnership with the CDSE, organised a virtual morning dedicated to the protection of essential basic services. Prey of choice for ever more ambitious and aggressive attackers, their cybersecurity is a ...
  • CFI, a new FIC offshoot dedicated to the security of operational technologies
    Cyber industrial safety - Cyber risks - Digital transition | Business - Opinions

    CFI, a new FIC offshoot dedicated to the security of operational technologies

    By Vincent Riou, Partner at Avisa Partners, and CFI Director Operational technologies (OTs)  are at the heart of our lives. They are used to produce what we consume, transport us, protect us, provide us with energy or clean ...
  • Regulating the digital space: an effort for all?
    Cyber risks - Digital Sovereignty - Security and Stability in Cyberspace

    Regulating the digital space: an effort for all?

    On 3 June, the Virtual FIC included a session on the regulation of the digital space. The discussions highlighted the need to increase the various forms of cooperation to meet the challenges posed by the increasing ...
  • Almost 80% of cyber security incidents involve a DNS query
    Cyber risks

    Almost 80% of cyber security incidents involve a DNS query

    As the central element of the Internet and the first point of entry for hackers, the Domain Name System (DNS) must be robust. Yet, cyberattacks are becoming more and more ingenious in corrupting it to infiltrate a corporate ...
  • Ransomware: a painful start for 2021
    Cyber risks | Opinions

    Ransomware: a painful start for 2021

    In only three months, the number of cyberattacks registered across the world already amounts to one third of the total figure for 2020. The Emotet threat, eradicated by law enforcement forces earlier this year, has already ...
  • Cyber collaboration and sharing, how to make SOC work more fluid
    Cyber risks

    Cyber collaboration and sharing, how to make SOC work more fluid

    An effective cyber-team has members who collaborate. With thousands of alerts to process quickly, SOCs are no exception. Understanding important information and how alerts and exchanges work is key to improving the overall ...
  • Cheering for French cyberstartups!
    Cyber risks - Operational security

    Cheering for French cyberstartups!

    The fight against cybercrime requires the adoption of security solutions. On average, several dozens of them are implemented in companies. They are offered by major cybersecurity actors on which buyers think they can rely in ...
<12345…>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2021 BY FIC, INC. ALL RIGHTS RESERVED.
Cyber News and Community
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
I agree that inCyber will process my personal data in accordance with its personal data policy, which I acknowledge having read, and in accordance with the GDPR.
Accept
Change settings
Cookie Box Settings
Cookie Box Settings

Privacy settings

Decide what cookies you want to allow. You can modify these settings at any time. However, this may cause some functions to be no longer available. For more information on deleting cookies, please consult your browser's help function. Learn more about the cookies we use.

With the cursor you can enable or disable different types of cookies:

  • Block all
  • Essential
  • Analytics
  • Advertising

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: do not forget the language version you have selected

This website does not:

  • Remember your login information. Functionality: remember social media settings
  • Feature: Remember the selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings
  • Feature: Remember the selected region and country

This website does not:

  • Remember your login information. Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions

This website does not:

  • Remember your login information. Advertising: Use information for tailor-made advertising with third parties
  • Advertising: allows you to connect to social sites
  • Advertising: Identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Use information for tailor-made advertising with third parties
  • Advertising: Allows you to connect to social sites. Advertising: identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website does not:

  • Remember your login details
Save & Close