Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-1-1.svg

The leading
event on Digital security
and trust issues.

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Trainings
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English

Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • + Other topics
    • Cyber industrial safety
    • Antifraud action
    • Digital identity & KYC
  • Interview of Abeer Khedr, Information Security Director
    Operational security

    Interview of Abeer Khedr, Information Security Director

    Review the interview of Abeer Khedr, Information Security Director of the National Bank of Egypt. She discusses her experience as well as the key strategic issues for the financial sector in Egypt. For more ...
  • Digital Sovereignty:  It is High Time to Have a Rant and Take Action!
    Operational security

    Digital Sovereignty: It is High Time to Have a Rant and Take Action!

    Five months! Five months have elapsed since March 2020 and the announcement by the President of the French Republic of the introduction of lockdown measures on the French territory. Five months during which our country, ...
  • Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?
    Operational security

    Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?

    Introduction 2020 – X.0 security has not solved the password issue. The “LCR Policy” (for minimum Length, Complexity, and Regular Renewal), intuitive though it may be, persists despite findings that challenge ...
  • Ransomware in Six Questions
    Operational security

    Ransomware in Six Questions

    What is ransomware? Ransomware is malicious software. Ransomware programs are computer viruses. These viruses block access to information systems or data stored on the victim’s computer or server, then demand that the ...
  • Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
    Operational security

    Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)

    In 2016, Vinci, a construction company, became the victim of a significant business email compromise (BEC)[1] attack. An email which appeared to come from Vinci’s communications director was sent to the news agency ...
  • Using differential privacy to protect privacy
    Operational security

    Using differential privacy to protect privacy

    The issue of privacy arises in each of our interactions with digital platforms that collect and share user data, sometimes without explicit consent. The rise of machine learning is based on training collected data that may ...
  • Securing Our Communications: From Email to WhatsApp and Beyond
    Cyber risks - Operational security

    Securing Our Communications: From Email to WhatsApp and Beyond

    (By Thomas Baignères and Matthieu Finiasz, OLVID) When Ray Tomlinson sent “QWERTYUIOP” over the ARPANET in July 1971, he probably did not suspect that this would be the beginning of a communication system that ...
  • Incyber
    Cyber risks - Digital transition - Operational security

    Voting Machine : Challenges and opportunities in the DRC (by Chrysostome NKOUMBI-SAMBA, MBA MSDN)

    3 November 2000: adoption of the Bamako Declaration[i], Section B of which emphasises the holding of free, reliable and transparent elections in the Francophone world. 13-14 October 2012: opening of the 14th Francophonie ...
  • CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
    Digital transition - Operational security - Security and Stability in Cyberspace

    CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY

    Interview with General (2S) Marc WATIN-AUGOUARD Cybersecurity goes hand in hand with cooperation, as per your approach: “no solution without public-private sector cooperation!” How do we plan for this collaboration? Can ...
  • Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
    Operational security

    Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks

    Industrial Control Systems (ICSs) are present in many areas to ensure the productivity and reliability of production systems. However, as security requirements were not taken into account in their design, these systems are ...
  • The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
    Digital Sovereignty - Operational security

    The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)

    90% of world trade depends upon maritime transport. From the transportation of raw materials to that of manufactured goods, this industry is the basis of our globalised contemporary economy. In a just-in-time economy, ...
  • Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
    Cyber risks - Operational security

    Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)

    In an even more connected society and facing the 2.5 quintillion data bytes generated every day in the world (2017, Up Numérique), companies have two important security challenges: protecting their data and information ...
<12345…>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2021 BY FIC, INC. ALL RIGHTS RESERVED.
Cyber News and Community
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
I agree that inCyber will process my personal data in accordance with its personal data policy, which I acknowledge having read, and in accordance with the GDPR.
Accept
Change settings
Cookie Box Settings
Cookie Box Settings

Privacy settings

Decide what cookies you want to allow. You can modify these settings at any time. However, this may cause some functions to be no longer available. For more information on deleting cookies, please consult your browser's help function. Learn more about the cookies we use.

With the cursor you can enable or disable different types of cookies:

  • Block all
  • Essential
  • Analytics
  • Advertising

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: do not forget the language version you have selected

This website does not:

  • Remember your login information. Functionality: remember social media settings
  • Feature: Remember the selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings
  • Feature: Remember the selected region and country

This website does not:

  • Remember your login information. Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions

This website does not:

  • Remember your login information. Advertising: Use information for tailor-made advertising with third parties
  • Advertising: allows you to connect to social sites
  • Advertising: Identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Use information for tailor-made advertising with third parties
  • Advertising: Allows you to connect to social sites. Advertising: identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website does not:

  • Remember your login details
Save & Close