Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-1-1.svg

The leading
event on Digital security
and trust issues.

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Trainings
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English

Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • + Other topics
    • Cyber industrial safety
    • Antifraud action
    • Digital identity & KYC
  • NIS 2: towards a European cyber security shield
    Cyber risks - Digital Sovereignty

    NIS 2: towards a European cyber security shield

    The revised NIS Directive: a critical introduction to the EU’s cybersecurity strategy and rules With the revision of the NIS directive or “NIS 2”, the EU Commission proposes to reshape the rules on network and ...
  • The transmission of information to the intelligence services
    Cyber risks - Digital Sovereignty - Security and Stability in Cyberspace | Opinions

    The transmission of information to the intelligence services

    Constitutional Council – Decision No. 2021-924 QPC of 9 July 2021, La Quadrature du Net The transmission of information to the intelligence services by the administrative authorities does not comply with the Constitution, ...
  • The future of digital autonomy of the EU
    Antifraud action - Cybercrime - Digital Sovereignty

    The future of digital autonomy of the EU

    In the face of the recent Covid-19 pandemic, the UN Secretary-General Antonio Guterres underlined how much, “as we recover and rebuild, digital technology will be more prominent and more important than ever”. With the ...
  • The ECA is in Lille!
    Cybercrime - Digital Sovereignty - Digital transition | Agenda

    The ECA is in Lille!

    The European Champions Alliance (ECA) is a non-for-profit initiative by a group of passionate entrepreneurs and business development experts who stand for European Tech and values. Our objective is to support the development ...
  • Regulating the digital space: an effort for all?
    Cyber risks - Digital Sovereignty - Security and Stability in Cyberspace

    Regulating the digital space: an effort for all?

    On 3 June, the Virtual FIC included a session on the regulation of the digital space. The discussions highlighted the need to increase the various forms of cooperation to meet the challenges posed by the increasing ...
  • Europe strengthens its cybersecurity
    Digital Sovereignty | Opinions

    Europe strengthens its cybersecurity

    The year 2020 has been rich in terms of EU announcements related to digital transformation. In February-March 2020, at a time when the Covid-19 crisis was dominating people’s minds, the Commission published ...
  • Illegal e-commerce: when neutrality shelters impunity!
    Antifraud action - Digital Sovereignty | Opinions

    Illegal e-commerce: when neutrality shelters impunity!

    An emerging reality twenty years ago, e-commerce is today unavoidable whatever its form, B to C but also C to C and B to B. The pandemic has accentuated this phenomenon even though the regulation of the net has changed ...
  • Doctolib, COVID vaccination appointment and GDRP
    Digital identity & KYC - Digital Sovereignty

    Doctolib, COVID vaccination appointment and GDRP

    According to the Council of State, the processing of appointments for the Covid 19 vaccination by the Doctolib website, although hosted by a subsidiary of an American company, is not contrary to the GDPR.
  • Digital space law
    Digital Sovereignty

    Digital space law

    (JUDICIAL JURISPRUDENCE, THE COURT OF APPEAL, Royal Courts of Justice, [2021] EWCA Crim 128, judgment of 5 February 2021, EncroChat case) The data collected by the French gendarmerie, in the context of the EncroChat case, is ...
  • 5G: The Constitutional Council validates “anti-Huawei” law
    Digital Sovereignty - Security and Stability in Cyberspace | Business

    5G: The Constitutional Council validates “anti-Huawei” law

    By Decision No. 2020-882 QPC of February 5, 2021, the Constitutional Council validated the “anti-Huawei” legislation challenged by the French telecom operators SFR, Bouygues Telecom and Free. The provisions ...
  • To be adequate or not…
    Digital Sovereignty

    To be adequate or not…

    Our British friends have cut ties with the European Union. As a result, the GDPR should no longer apply after a transitional period. Personal data that used to circulate freely will be subject to new rules if the European ...
  • Realities and perspectives of the structuring of the Franco-German and European cloud
    Digital Sovereignty - Digital transition

    Realities and perspectives of the structuring of the Franco-German and European cloud

    In a delicate interdependence with the United States and in a difficult definition of its sovereign Cloud, the European Union still seems to also juggle internally on the management of its data between on the one hand, a ...
<1234>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2021 BY FIC, INC. ALL RIGHTS RESERVED.
Cyber News and Community
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
I agree that inCyber will process my personal data in accordance with its personal data policy, which I acknowledge having read, and in accordance with the GDPR.
Accept
Change settings
Cookie Box Settings
Cookie Box Settings

Privacy settings

Decide what cookies you want to allow. You can modify these settings at any time. However, this may cause some functions to be no longer available. For more information on deleting cookies, please consult your browser's help function. Learn more about the cookies we use.

With the cursor you can enable or disable different types of cookies:

  • Block all
  • Essential
  • Analytics
  • Advertising

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: do not forget the language version you have selected

This website does not:

  • Remember your login information. Functionality: remember social media settings
  • Feature: Remember the selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings
  • Feature: Remember the selected region and country

This website does not:

  • Remember your login information. Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions

This website does not:

  • Remember your login information. Advertising: Use information for tailor-made advertising with third parties
  • Advertising: allows you to connect to social sites
  • Advertising: Identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Use information for tailor-made advertising with third parties
  • Advertising: Allows you to connect to social sites. Advertising: identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website does not:

  • Remember your login details
Save & Close