Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
https://incyber.org/wp-content/uploads/2021/07/logo-fic-1-1.svg

The leading
event on Digital security
and trust issues.

Read more
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English
  • Advertising and partnerships
  • picto-mailNewsletter
  • picto-searchSearch
  • Français
  • English
InCyber
  • Events
  • Business
  • Nominees
  • Trainings
  • Opinion
  • Publications
  • Videos
InCyber
InCyber
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Français
  • English

Cyber News and Community

  • Contributors
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
  • Agenda

Themes

  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC

inCyber

  • Advertising and partnerships
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • + Other topics
    • Cyber industrial safety
    • Antifraud action
    • Digital identity & KYC
  • Analysis of HTTPS Traffic: Ending the Gridlock (By Pierre-David Vignolle and Martine Ricouart-Maillet, BRM Avocats)
    Operational security

    Analysis of HTTPS Traffic: Ending the Gridlock (By Pierre-David Vignolle and Martine Ricouart-Maillet, BRM Avocats)

    The TLS protocol (HTTPS traffic) is used on the Internet to secure from end to end the confidentiality and integrity of communications between a client and a server by online services websites, banks (of course) and ...
  • Trends in the technologies of detection and response to cyber attacks – By Helmi RAIS, Senior Manager at Alliacom and Team Manager of AlliaCERT
    Operational security

    Trends in the technologies of detection and response to cyber attacks – By Helmi RAIS, Senior Manager at Alliacom and Team Manager of AlliaCERT

    Introduction It has always been shown that attackers innovate faster than defence teams. According to the report in M-Trends 2016, innovation allows the hackers to have an operating window of 143 days on average before ...
  • Incident Response: How far can automatisation go ?
    Operational security

    Incident Response: How far can automatisation go ?

    Mr.David Grout, SE Director, South Europe at FireEye, Mr. Sebastien Bombal, Anticipation Officer, Chief of the Cyber Defense Staff office, and Mr. Sylvain Labetoule, Datacenter technical Leader at Orange, will be discussing ...
  • Incyber
    Operational security

    CYBER SECURITY: THE NEW BUSINESS PRIORITY FACING EXECUTIVES – By Dr Arthur M. Langer, Columbia University

     INTRODUCTION Much has been written regarding the importance of how companies deal with cyber threats. While most organizations have focused on the technical ramifications of avoiding being compromised, few have examined ...
  • Cybersecurity video of the month: “would you trust this man?” by Paypal
    Operational security

    Cybersecurity video of the month: “would you trust this man?” by Paypal

    Would you trust this man? Be careful when buying and selling online too, crooks may try to rip you off ! This series of short videos by PayPal features traditional scam attempts: suspicious private car sale, dubious ...
  • Best practices in case of a cyber extortion [ By Adrien Petit, CEIS]
    Operational security

    Best practices in case of a cyber extortion [ By Adrien Petit, CEIS]

    Best practices in case of a cyber extortion 1. Typology of cyber-extortion cases The most common type of cyber-extortions is perpetrated through crypto-ransomware. Attackers first use a malware to encrypt files on the ...
  • Cybersecurity, Cyril Hanouna and the alien effect [by Clément Rossi, CEIS]
    Operational security

    Cybersecurity, Cyril Hanouna and the alien effect [by Clément Rossi, CEIS]

    This article follows on from the FIC Observatory breakfast of 6 April 2016 on raising awareness. This breakfast, coordinated by Gérard Pesch, organiser of the Security Film Festival, brought together Gil Delille, ...
  • Incyber
    Operational security

    Dealing with spam: a technical & organizational approach [by Charles Ibrahim]

    Introduction Where are we working? Reminder about the purpose of a SOC, a CERT, and a Security Information and Event Manager (SIEM) The main purpose of a Security Operation Center (SOC) is to provide an in-depth defense… ...
  • Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]
    Operational security

    Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]

    Having exposed a model to represent cyber attacks based on characteristics that can be broken down and the dynamics of its stepwise process, the author now discusses its essential measures and proposes a crisis recovery plan ...
  • An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]
    Operational security

    An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]

    This article presents a conceptual framework that supports a customer private data ecosystem that would benefit both the consumer and the companies. The framework provides for the consumers the ability to trace their private ...
  • Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]
    Operational security

    Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]

    eIDAS Regulation No. 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market  Although digital technologies ...
  • Incyber
    Operational security

    The Security of Executives: A Challenge for CISOs [by Guillaume Tissier, CEIS]

    The security of executives’ data represents a real challenge for CISOs and enterprise security experts. Indeed, executives are particularly exposed owing to their roles and the concentration of strategic information ...
<…34567>
InCyber
  • Linkedin
  • Twitter
  • Youtube
PRIVACY POLICY TERMS AND CONDITIONS COPYRIGHT © 2021 BY FIC, INC. ALL RIGHTS RESERVED.
Cyber News and Community
  • Events
  • Trainings
  • Nominees
  • Business
  • Opinion
  • Publications
Themes
  • Operational security
  • Cyber risks
  • Digital transition
  • Cybercrime
  • Digital Sovereignty
  • Security and Stability in Cyberspace
  • Cyber industrial safety
  • Antifraud action
  • Digital identity & KYC
  • About
  • Sitemap
  • Contact us
  • Data protection
  • Legal Notice and Terms
I agree that inCyber will process my personal data in accordance with its personal data policy, which I acknowledge having read, and in accordance with the GDPR.
Accept
Change settings
Cookie Box Settings
Cookie Box Settings

Privacy settings

Decide what cookies you want to allow. You can modify these settings at any time. However, this may cause some functions to be no longer available. For more information on deleting cookies, please consult your browser's help function. Learn more about the cookies we use.

With the cursor you can enable or disable different types of cookies:

  • Block all
  • Essential
  • Analytics
  • Advertising

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: do not forget the language version you have selected

This website does not:

  • Remember your login information. Functionality: remember social media settings
  • Feature: Remember the selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings
  • Feature: Remember the selected region and country

This website does not:

  • Remember your login information. Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Tailor information and advertising to your interests based on eg. the content you have visited before. (Currently, we do not use targeting or cookie targeting.) Advertising: Collect personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions

This website does not:

  • Remember your login information. Advertising: Use information for tailor-made advertising with third parties
  • Advertising: allows you to connect to social sites
  • Advertising: Identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website will:

  • Essential: remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather the information you enter into a contact form, newsletter and other forms on all pages
  • Essential: Keep track of what you enter into a shopping cart
  • Essential: authenticate that you are logged in to your user account
  • Essential: Remember the language version you selected. Functionality: remember social media settings Functionality: Remember selected region and country
  • Analytics: Keep track of your pages visited and interactions taken
  • Analytics: track your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: increases the data quality of statistical functions
  • Advertising: Use information for tailor-made advertising with third parties
  • Advertising: Allows you to connect to social sites. Advertising: identify the device you are using
  • Advertising: Gather personally identifiable information such as name and location

This website does not:

  • Remember your login details
Save & Close