
CONFERENCES & WORKSHOPS PROGRAMME
PROGRAM
IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.
CONFERENCES & WORKSHOPS
- 22 March 2023
- 23 March 2023
- All
EFFICIENTIP
Zero Trust: Using DNS as an Enabler of Your First Line of DefenseIn today’s complex geopolitical environment, cybersecurity is top of mind...
EGERIE
How to predict the ROI of a risk-driven cybersecurity strategy?To develop a true risk-driven cybersecurity strategy, companies, and their...
PING IDENTITY
The identity to implement innovative digital experiences for customers (CIAM)Customer identity and access management has evolved. Providing a seamless...
Pentera Security Ltd
Security Validation at the Heart of Exposure Management featuring GecinaSurprisingly, the majority of breach-reasons today are NOT vulnerability-related, but...
ADVENS
Implementation of an outsourced SOC: Feedback from L'Occitane with AdvensThe SOC (Security Operations Center) is now the key element...
RUBYCAT
Feedback from the GHT Est Hérault Sud Aveyron - The place of the PAM/bastion in the security of an ISVincent Templier, IS security manager for the CHU and the...
SECURITYSCORECARD
Do you know what hackers will exploit from your attack surface?Everyone wonders why with all the most advanced cybersecurity technologies...
OWN
Retrospective 2022: An overview of cyber threats in the maritime sectorWith the rapid evolution of information systems and computer networks...
Kleverware
Maximizing security and compliance through identity and access governanceDiscover how an IAG (Identity and Access Governance) solution can...
22 March 2023 09:00 to 09:45 Croisette Room Workshop
Organized by EFFICIENTIP
Zero Trust: Using DNS as an Enabler of Your First Line of Defense
In today’s complex geopolitical environment, cybersecurity is top of mind for all organizations. Every IT infrastructure relies on DNS, so it is essential to protect DNS from attacks. But at the same time, when implemented correctly using purpose-built technology, DNS can also provide valuable information and improved access control to vital apps and services, making it an active security component for your zero trust framework.
This session explains:
- Why visibility, threat intelligence and app access filtering make DNS your first line of defense
- How to leverage DNS to reduce the attack surface and prevent lateral movement of threats
- Example use case where DNS enhances zero trust by controlling access to critical services
Conference Moderator:
Alexandre CASSEZ
Customer Solutions Architect – EFFICIENTIP22 March 2023 09:00 to 09:45 Lérins Room Workshop
Organized by EGERIE
How to predict the ROI of a risk-driven cybersecurity strategy?
Where it often remains very abstract or too technical, while financial trade-offs are at stake, EGERIE thus helps organizations to assess and adjust, almost in real time, the degree of cyber risk weighing on IT systems.
By having precise indicators in this way, C-Levels can make the right decisions and precisely know the ROI of the cyber action plan implemented.
What about discussing this innovative and differentiating approach to risk-based cybersecurity management?
22 March 2023 14:30 to 15:15 Croisette Room Workshop
Organized by PING IDENTITY
The identity to implement innovative digital experiences for customers (CIAM)
Customer identity and access management has evolved. Providing a seamless user experience is no longer enough to meet the demands of companies and their customers.
Enterprises need a cloud platform that provides a seamless customer journey and intelligent risk-based mechanisms to verify and prove customer identity, detect digital fraud, and preserve the user experience.
Learn how to manage the identities of millions of customers to accelerate revenue and build customer loyalty.
Translated with www.DeepL.com/Translator (free version)
22 March 2023 14:30 to 15:15 Esterel Room Workshop
Organized by Pentera Security Ltd
Security Validation at the Heart of Exposure Management featuring Gecina
Surprisingly, the majority of breach-reasons today are NOT vulnerability-related, but rather caused by misconfiguration, application interfaces, supply chain or credential related security gaps.
Exposure Management is here to allow a strategy and process for addressing the reduction of risk over the entire attack surface.
This session will present a simple, pragmatic approach to implementing an Exposure Management strategy, drawing on the experience of Joël Robin - CTO at Gecina and how they use Automated Security Validation as part of their journey to exposure reduction.
Speakers:
Ludovic VARET
Security & Architecture Manager – GECINAJoël ROBIN
CTO – GECINAYonathan GUIRCHOUN
Regional Manager – PENTERA SECURITYChristophe VÉRITÉ
Cyber security engineer – PENTERA SECURITY23 March 2023 09:00 to 09:45 Croisette Room Workshop
Organized by ADVENS
Implementation of an outsourced SOC: Feedback from L'Occitane with Advens
The SOC (Security Operations Center) is now the key element of a Cyber Defense system. The use of a service provider is an effective and adapted response to the challenges of recruitment, expertise, reactivity and control of the associated technological complexity.
Advens has been supporting L'Occitane Group for more than 5 years through an outsourced SOC service. This long-lasting partnership has allowed the company to develop its maturity and its capacity to detect and react to security incidents.
- How to set up a SOC-as-a-Service?
- What monitoring perimeter and how to develop it?
- How to integrate industrial environments and set up an IT and OT SOC?
- What is the contribution of EDR and XDR to add reaction to detection?
This testimony will give you concrete answers to all these questions!
Speakers:
Robin MERQUIOL
SOC Manager – ADVENSAurélien SIMONET
Information Security Domain Leader – L'OCCITANE23 March 2023 09:00 to 09:45 Lérins Room Workshop
Organized by RUBYCAT
Feedback from the GHT Est Hérault Sud Aveyron - The place of the PAM/bastion in the security of an IS
Vincent Templier, IS security manager for the CHU and the GHT Est Hérault - Sud Aveyron will give a feedback on the importance and place of a PAM/bastion in the security of an IS, especially in the context of a hospital grouping.
After having implemented the bastion PROVE IT on the IS of the CHU of Montpellier in 2019, Vincent Templier worked on the implementation of this bastion on the whole GHT, which represents more than 8 care structures.
Translated with www.DeepL.com/Translator (free version)
Speakers:
Vincent TEMPLIER
IS Security Manager – GHT EST HERAULT SUDE AVEYRONCathy LESAGE
CEO – RUBYCAT23 March 2023 14:30 to 15:15 Croisette Room Workshop
Organized by SECURITYSCORECARD
Do you know what hackers will exploit from your attack surface?
Everyone wonders why with all the most advanced cybersecurity technologies and tools, the large budgets spent by government agencies and international companies, cyber attacks continue to proliferate?
Cybercriminals are diversifying their approaches and industrializing them by constantly monitoring your most vulnerable "blind spot" "attack surface" exposed on the Internet.
Find out how SecurityScorecard can help you identify, continuously monitor your attack surface and build a prevention plan to reduce the impact of cyber attacks.
Speakers:
Raib NADJI
Field Sales Director, France – SECURITYSCORECARDIsrael MAURO
Senior Customer Success Manager – SECURITYSCORECARD23 March 2023 14:30 to 15:15 Lérins Room Workshop
Organized by OWN
Retrospective 2022: An overview of cyber threats in the maritime sector
With the rapid evolution of information systems and computer networks in the shipping world, the maritime sector is now a highly connected sector (navigation systems, office workstations used by the crew, platform management systems, etc.) and has seen the emergence of new cyber risks over the last ten years.
From common threats to the most targeted attacks, from the most widespread malware to the panorama of TTPs (Tactics, Techniques and Procedures) specific to the maritime sector, from the most active cybercriminal actors to the geopolitical challenges, OWN & the M-CERT review the cyber events that marked the year 2022 and the major associated trends in the maritime sector.
This presentation is based on a year of work carried out in the framework of a partnership between OWN and M-CERT.
Speakers:
Marion LACHIVER
CTI Analyst – OWNOlivier JACQ
Technical and Scientific Director – FRANCE CYBER MARITIME23 March 2023 14:30 to 15:15 Esterel Room Workshop
Organized by Kleverware
Maximizing security and compliance through identity and access governance
Discover how an IAG (Identity and Access Governance) solution can improve security, compliance, and productivity in an IAM project. You will see the challenges of identity and access management and how an IAG solution can enhance the security of sensitive information, reduce data breach risks, and ensure regulatory compliance. You will learn about key features and real-world use cases across various business sectors and contexts.
Speaker:
Jean-François LOUÂPRE
Senior Cybersecurity Consultant – HACKENA