Close
  • Français
  • English

Sector-based Approaches

By the Strategy Challenge team The ‘Cyber 9/12’ Strategy Challenge For the third consecutive year, the FIC will host, on 19, 20 and 21 January 2021, the French edition of the ‘Cyber 9/12’ Strategy Challenge, co-organized by the Atlantic Council, the GEODE project (Paris 8 University) and CEIS. Last year, the 2020 edition pitted a dozen teams of…

Read More

It is to be hoped that, in a few months’ time, the French Government will announce the measures it intends to adopt to provide citizens with a sovereign digital identity. In light of the experience gained, the preparatory work and the initiatives taken—from France Connect to Alicem—it is likely that these decisions will put an…

Read More

  Humans are unable to single-handedly deal with cyber attacks. This is the view shared by cybersecurity professionals. There are several reasons to this: the volume of attacks, their constant mutations, the speed of reaction they require, and the lack of expertise on the market. Artificial intelligence (AI), already widely used in fraud prevention, increasingly…

Read More

Olivier is a Research Fellow at RUSI’s Centre for Financial Crime and Security Studies. Prior to joining RUSI in 2017, he worked with the Financial Action Task Force (FATF), the global standard-setter in the areas of anti-money laundering and counter terrorist financing (AML/CTF), where he focused on evaluating the effectiveness of countries’ AML/CFT efforts. From…

Read More

By Jean-Marc ROUE,  President of Armateurs de France Nautical security and navigation equipment, telecommunications, energy production or propulsion systems… The world of maritime transport is not immune to the digital evolution, which is necessary for its profitability and competitiveness. But digitisation also increases risks, especially cyber risk: equipped with many digital technologies, ships, like other…

Read More

The importance of cyber insurance for business  Almost all modern companies require secure internet access and data management systems in their business model. The traditional notion of security involves ‘Confidentiality’, ‘Integrity’, and ‘Availability’ (CIA). Consider a simple case of a retail vendor who offers an online customer support service. They will be expected to keep…

Read More