PROGRAM

IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.

2024 CONFERENCES & WORKSHOPS

Filter
20 March 2024 09:00 to 09:45 Croisette Room Workshop

NIS 2: When cyber risk analysis and management become European obligations

Organized by EGERIE

Continue reading

Adopted at the end of 2022, the NIS2 directive is now in the hands of member states, which have until October of this year to transpose it.
- What are the new obligations in terms of cyber risk analysis and management? 
- Who is affected? 
- What are the consequences of non-compliance? 
- How can technical constraints be transformed into business opportunities?
Let's take stock and anticipate this strategic and structuring issue for your organizations at our EGERIE workshop.

Speaker:

Bruno GUILLOUX
Sales Director France – EGERIE

20 March 2024 09:00 to 09:45 Lérins Room Workshop

Navigating Exposure Management - a CISO’s Perspective for 2024

Organized by PENTERA

Continue reading

Join Nicolas Bernetti, CISO at GIDE LOYRETTE NOUEL as he shares his journey to reduce exposure and manage security gaps with Automated Security Validation. He will reveal the challenges he faced and how he overcame them to increase his organization’s overall security posture.

Speakers:

William CULBERT

William CULBERT
REGIONAL DIRECTOR – PENTERA

Nicolas BERNETTI

Nicolas BERNETTI
CISO – GIDE LOYRETTE NOUEL

20 March 2024 09:00 to 09:45 Esterel Room Workshop

Why is patch management still essential in 2024?

Organized by Tanium et Trescal

Continue reading

Find out how the Trescal Group has solved the patch management issue by accelerating the time to patch and simplifying the process of delivering compliance, to reduce the risk of security breaches, thanks to Tanium’s Converged Endpoint Management (XEM) solution. Alexandre Le Darz, IT Infrastructure Engineer at the Trescal Group, will talk to us about his challenges, and the implementation and explain the various advantages of his chosen solution.

Trescal is the world's specialist in metrology services and test and measurement instrument fleet management.

Conference Moderator:

Mamoun BELAAROUSSI

Mamoun BELAAROUSSI
Director, Emerging Enterprise – TANIUM

Speakers:

Alexandre LE DARZ

Alexandre LE DARZ
IT Infrastructure Engineer – TRESCAL

Sebastien EPAILLARD

Sebastien EPAILLARD
Director, Technical Solutions Engineer – TANIUM

20 March 2024 09:00 to 09:45 MÉDITERRANÉE VIP CLUB Workshop

Ransomware dry run: Feedback from CISOs on an innovative and unique solution for simulating real-life ransomware attacks

Organized by Holiseum

Continue reading

"What would happen if you, too, were to suffer a ransomware attack?" This is the simple question that the Ransomware Dry Run™ will answer.

The Ransomware Dry Run™ is the first offer on the market to simulate a sophisticated ransomware attack in actual conditions thanks to a ransomware of our own design, stripped of its malicious payload but reproducing the most advanced evasion techniques in terms of installation, encryption, data extraction or network propagation. Acting just like a vaccine, our ransomware is inoculated voluntarily in some machines (patients zero) of our clients’ information systems in order to challenge the defenses in place and thus, establish the level of exposure to the specific ransomware threat.

HOLISEUM received two innovation awards in 2021 (Innovation Award at the Cybersecurity «Cas d’Or» and Gold Medal Winner at the CyberNight Innovation Competition) and several positive public testimonials from significant customers.

Today, our customers are sharing their experience of this unique solution: the Ransomware Dry Run™. Constantly evolving in line with the latest developments in cyber extortion techniques, the Ransomware Dry Run™ will be presented to you by Faïz Djellouli, CEO of Holiseum, and Renaud Lifchitz, Chief Scientific Officer of Holiseum.

Speakers:

Faïz DJELLOULI

Faïz DJELLOULI
CEO – HOLISEUM

Renaud LIFCHITZ

Renaud LIFCHITZ
Chief Scientific Officer - IT & IoT Security Expert – HOLISEUM

20 March 2024 14:30 to 15:15 Croisette Room Workshop

Navigate through your Cyber Threat with Open CTI

Organized by OWN

Continue reading
20 March 2024 14:30 to 15:15 Lérins Room Workshop

Decentralised identity: give users control over access (CIAM)

Organized by PING IDENTITY

Continue reading

Decentralised identity solutions give users back the power to manage their personal data. They create a cornerstone of trust between the user, the issuers of identity attributes and the certifiers who guarantee their authenticity. Companies that are able to anticipate these changes and implement them have a competitive advantage in terms of optimising their processes, controlling their costs and streamlining their customer relations. Join this Ping Identity session to learn more about decentralised identity in the context of CIAM.

Speaker:

Philippe DUBUC

Philippe DUBUC
Principal Solution Architect – PING IDENTITY

20 March 2024 14:30 to 15:15 Esterel Room Workshop

Feedback: why good practice is no longer enough in the face of today’s threats

Organized by PATROWL

Continue reading

Insights from DIOT-SIACI's CISO, the undisputed French market leader in insurance consulting, management and training, who faces the daily challenges of securing his company’s exposure to the Internet.

Find out why, in today’s fiercely competitive environment, it’s vital to implement innovative solutions to effectively combat new threats, and above all, how to avoid the proliferation of vendor solutions.

Conference Moderator:

Vladimir KOLLA

Vladimir KOLLA
Co-founder – PATROWL

Speaker:

Insurance Company RSSI
RSSI – DIOT-SIACI

21 March 2024 09:00 to 09:45 Croisette Room Workshop

Embrace DDI and DNS observability to combat cyberthreats and optimize your network operations and performance

Organized by EFFICIENTIP

Continue reading

Network infrastructure has undergone profound changes in recent years, resulting in increased complexity. Network teams are now challenged to manage, operate, and protect networks, struggling with limited visibility, data overload, and security vulnerabilities.

Join us for an enlightening session on how DDI and DNS observability is a game-changer, providing comprehensive, actionable insights into your infrastructure and helping to build full-stack observability. We'll explore:

  • Why you need DDI observability

  • The strategic importance of DNS-centric intelligence

  • Real use cases and benefits achieved

Don't miss this opportunity to learn why evolving your observability solutions is the next big thing in IT, and why DDI Observability is pivotal for identifying and resolving network issues.

Conference Moderator:

Guillaume LE POULAIN

Guillaume LE POULAIN
Customer Solutions Architect – EFFICIENTIP

21 March 2024 09:00 to 09:45 Lérins Room Workshop

RETEX Transports Mauffrey : Simply control and audit your privileged access with the PROVE IT administration bastion.

Organized by RUBYCAT

Continue reading

Damien Sibille, Head of the Networks and Security Department within the MAUFFREY group, one of the leading French freight transport companies, will share his experience regarding the role and importance of a PAM - Administration Bastion for controlling and tracing access (privileged internal and external users) to sensitive SI equipment.

He will explain why the MAUFFREY group chose the PROVE IT software solution from Rubycat in March 2023.

Damien Sibille will return:

  • The context and IT & cybersecurity issues of transport MAUFFREY.
  • The benefit of setting up a bastion (population, type of information accessed, turnover, etc.).
  • The deployment, administration and maintenance of the PROVE IT solution.

Quentin Bernard, technical sales engineer at Rubycat, will give a detailed presentation of the PROVE IT software solution.

A workshop not to be missed to discover a complete and concrete testimony, in interaction with the editor Rubycat, for organizations wishing to secure their infrastructure and effectively manage access and privileged accounts.

Speaker:

Damien SIBILLE

Damien SIBILLE
Manager of the networks and security division – TRANSPORT MAUFFREY

21 March 2024 09:00 to 09:45 Esterel Room Workshop

Cybercrime Trends 2024

Organized by SOSAFE

Continue reading

Cybercriminals are always innovating, instrumentalizing new technologies and current events for their success. More than ever, staying ahead of the evolving cyber threat landscape is key to keep up with cybercriminals, strengthening resilience to security risks. Embark on a gripping journey into the heart of the digital underworld with our talk: It will empower you to know about emerging threats, identify early signs of an attack, and respond effectively.

Speaker:

Andrea GERRESHEIM

Andrea GERRESHEIM
Cybersecurity Awareness Expert – SOSAFE

21 March 2024 14:30 to 15:15 Esterel Room Workshop

DevSecOps: observability for application security

Organized by DYNATRACE

Continue reading

How can you optimize the vulnerability management of your applications throughout their entire lifecycle? What is the key to meeting the growing demand for rapid development while controlling security risks?  
During this workshop, you'll discover how we can go beyond Dynatrace's traditional core business of observability to help you detect vulnerabilities in real time, continuously, from the development phase right through to production. And so protect your organization against growing attacks, while accelerating the release cycle through better DevSecOps collaboration. 
Frédéric Farjon, in charge of the AppSec offering, will shed light on all these issues, and explain how you can turn application vulnerability into a bug like any other within your company.

21 March 2024 14:30 to 15:15 Croisette Room Workshop

Towards a passwordless future

Organized by LASTPASS

Continue reading

Companies see a wide range of benefits in implementing passwordless authentication - including improved security posture, consolidation of their technology stack, reduced pressure on IT resources and improved user experience. 
When it comes to authenticating your employees, the multiplicity of methods makes for a complex technology stack. What if there was a simpler solution? One that could consolidate your tools while doing away with a login method that relies heavily on human behavior - passwords.

Find out more:
- Why companies are turning to passwordless authentication to secure their data;
- How and when they plan to implement passwordless technology within their organization;
- The important role of passkeys in this passwordless future.

21 March 2024 14:30 to 15:15 Lérins Room Workshop

How securing your applications, APIs and data will help you comply with the NIS2 directive and new regulations

Organized by IMPERVA A THALES COMPANY

Continue reading

Data and APIs are currently major blind spots in terms of security, and are increasingly being exploited as part of supplychain attacks.

In fact, according to Gartner, by 2024, misuse of APIs and associated data breaches will double. 

On the eve of the NIS2 regulatory changes, find out what security practices you need to adopt for your data and APIs in an on-premises, hybrid and/or multi-cloud environment. 

This workshop will enable you to learn more about NIS2, security methods and tools such as discovery and classification, vulnerability analysis and behavioural analysis.

Speakers:

Mohamed LALLOUCH

Mohamed LALLOUCH
Data Security Specialist – IMPERVA A THALES COMPANY

Mehdi BOUMAIZA²

Mehdi BOUMAIZA²
Application Security Specialist – IMPERVA A THALES COMPANY