FIC 2022

Regain control of your digital environment

June 7, 8 & 9 / Lille Grand Palais / booth B2

Make an appointment with our experts







Source: 2021

The International Cybersecurity Forum brings together experts from the digital security field in Lille on 7,8, 9 June 2022 and has the particularity to combine :

  • a Forum to facilitate thought leadership and exchange within the European cybersecurity ecosystem
  • a Trade show dedicated to meetings between suppliers of cybersecurity solutions and buyers

Shaping Europe’s digital future is essential to make sure it is based on digital trust and sovereignty.

We look forward to presenting our unique end-to-end solutions portfolio, from consulting to product solutions, to address your cybersecurity and data sovereignty concerns and help you make your digital transformation a success.

Date and location

June 7, 8 & 9, 2022

Lille Grand Palais, Lille, France

Booth B2

Take a look at our program

June 8th

Plenary “Europe, a normative power. What next?”
From 9:00 to 11:o0 am
Cyril Dujardin, Senior Vice-President & Deputy Head de BDS & Head d’Atos Digital Security

Round table at ID-Forum “”e-wallet”: what is the outcome for managing titles and attributes?
From 10:30 to 11:30 am
David Leporini, Cybersecurity Products Strategy & Innovation Director

Round Table ” CISO: Get your Board of Directors on board “
From 11:30 am to 12:30 pm
Paul Bayle, Head Of Security & Group Chief Security Officer d’Atos

Technical demonstration
From 12:20 pm to 12:50 pm

Presentation of the Start-Up Award
18:30 pm
Zeina Zakhour, Global CTO for Atos Digital Security

June 9th

Roundtable “Cybersecurity of major sporting events: new events, new rules?
From 1pm to 2pm

ZOOM on the technical demonstration
From 12:20 pm to 12:50 pm

Dual Encryption on O365 / An Efficient and Robust Implementation of the DKE Protocol

Client-side encryption is one of the most effective approaches when it comes to protecting the confidentiality of exchanged data. Few solutions are compatible with this approach as it makes the data opaque to the service provider.

While Microsoft recently introduced a robust client-side encryption mechanism (DKE for Double Key Encryption), its secure implementation can be particularly complex. Therefore, Atos and DuoKey have teamed up to provide a highly secure implementation of the DKE protocol by guaranteeing the generation and sequestration of keys in French cryptographic boxes (HSM) qualified by the ANSSI.

We will also be present…

On the FIC Innovation Village to help startups pitch their solution
And in the “European Cyber Cup” competition to coach a school in the race for the prize

School sponsorship

Participation to the EC2

This year Atos is pleased to announce the sponsoring of the ECE school during the European Cyber Cup.

Our experts will accompany the 0 x ECE team during this 48h competition which includes 7 challenges:

  • OT
  • IA
  • Forenseic
  • Bug Bounty
  • CTF
  • Escape Game

Come meet our experts at booth B2 !

You’ll be able to discover:


Your complete identity and access management solution, on premises and/or as a service, to control identity and access, even in the Cloud., to control identity and access, even in the Cloud.

Read more


PKI solutions offered on prem or as a service allow millions of people to authenticate and securely access IT resources.

Read more


  • End-to-end Data Protection offering with sovereign encryption solutions (HSM, VPN, …)
  • To assist you in your transformation towards “Security and Privacy By Design”
  • A joint solution Atos/DuoKey of encryption
  • To secure your data in a sovereign manner even when migrating on Office 365
  • Development of sovereign security components.

Read more

Cybersecurity services

  • Full range of managed security incident detection and response services,
  • Managed from 16 security operations centers (SOCs)
  • 24 hours a day worldwide
  • To combat advanced persistent threats

Read more

AIsaac Plateform

A cloud-native Managed Detection and Response solution with hybrid and multi-cloud support available as well in a sovereign manner, on premises.

Read more


The distribution of secure equipment and rugged PCs and tablets.

Read more

Would you like to make an appointment with one of our experts?

Please fill out this form and explain your request, we will get back to you shortly.

Thank you for your interest.You can download the report here.
A member of our team will be in touch with you shortly
  • Share on Linked In