Tuesday 23 January 2018

Click to close
THEME
PATHWAYS
Click to close
SPEAK
FORMATS
P01
|Tuesday 09:00 - 11:30|Plenary Session
Cyber resilience: fantasy or reality?
DT01
|Tuesday 11:00 - 11:30|Technical demonstration
BOMGAR - Six steps to secure access: methodology and user experiences
MC01
|Tuesday 11:00 - 12:00|Master class
A01
|Tuesday 11:30 - 12:30|Workshop
Cloud Computing: what will change with GDPR
A02
|Tuesday 11:30 - 12:30|Workshop
Ransomware and which forms of international cooperation to cope with it
A03
|Tuesday 11:30 - 12:30|Workshop
Linking SOC and crisis managment
A04
|Tuesday 11:30 - 13:00|Workshop
A05
|Tuesday 11:30 - 13:00|Workshop
Business continuity & Disaster Recovery Plans : the keys to success
A06
|Tuesday 11:30 - 12:30|Workshop
How do we harmonize our certification outlines to reconcile different requirement levels?
A07
|Tuesday 11:30 - 12:30|Workshop
The real added value of Strategic Cyber Threat Intelligence
A08
|Tuesday 11:30 - 12:30|Workshop
Security by design, a new commercial and industrial imperative
A09
|Tuesday 11:30 - 12:30|Workshop
Should Hack Back be authorized for private corporations?
A10
|Tuesday 11:30 - 12:30|Workshop
Cyber-Jidahism: public/private cooperation put to the test
DT02
|Tuesday 11:30 - 12:00|Technical demonstration
ADVENS
TV01
|Tuesday 11:30 - 12:00|TV Show
DT03
|Tuesday 12:00 - 12:30|Technical demonstration
SPLUNK
MC02
|Tuesday 12:00 - 12:45|Master class
Cybersecurity industrial policy: international comparison
TV02
|Tuesday 12:00 - 12:30|TV Show
DT04
|Tuesday 12:30 - 13:00|Technical demonstration
SCILLE
TV03
|Tuesday 12:30 - 13:00|TV Show
MC03
|Tuesday 13:00 - 14:00|Master class
DT05
|Tuesday 14:00 - 14:30|Technical demonstration
NES & Cymulate: « Breach & Attack Simulation Technologies »
MC04
|Tuesday 14:00 - 15:00|Master class
TV04
|Tuesday 14:00 - 14:30|TV Show
C01
|Tuesday 14:15 - 15:00|Conference
Akamai : Credential abuse challenges typical bot management strategies
C02
|Tuesday 14:15 - 15:00|Conference
Naval Group
C03
|Tuesday 14:15 - 15:00|Conference
OVH - GDPR compliance in 3 clicks
C04
|Tuesday 14:15 - 15:00|Conference
Airbus DS
C05
|Tuesday 14:15 - 15:00|Conference
F-Secure
FT03
|Tuesday 14:15 - 14:30|FIC Talk
IBM
DT06
|Tuesday 14:30 - 15:00|Technical demonstration
Guarantee the security of your IS through continued control of the maintenence
TV05
|Tuesday 14:30 - 15:00|TV Show
FT04
|Tuesday 14:40 - 14:55|FIC Talk
Alliacom
DT07
|Tuesday 15:00 - 15:30|Technical demonstration
JUNIPER NETWORKS
MC05
|Tuesday 15:00 - 16:00|Master class
FT05
|Tuesday 15:05 - 15:20|FIC Talk
Wavestone : NotPetya: behind the scenes of incident response and lessons learned
C06
|Tuesday 15:30 - 16:15|Conference
Engie Ineo
C07
|Tuesday 15:30 - 16:15|Conference
Thales
C08
|Tuesday 15:30 - 16:15|Conference
Trend Micro
C09
|Tuesday 15:30 - 16:15|Conference
Orange
C10
|Tuesday 15:30 - 16:15|Conference
Palo Alto
DT08
|Tuesday 15:30 - 16:00|Technical demonstration
COGICEO
DT09
|Tuesday 16:30 - 17:00|Technical demonstration
QUALYS - Agile, rapid app development and deployment must be secure. Qualys adds “Sec” to “DevOps”
P02
|Tuesday 16:45 - 19:00|Plenary Session
How can breakthrough innovation be revived in Europe?
DT10
|Tuesday 17:00 - 17:30|Technical demonstration
Manage your vulnerabilities with Cyberwatch to improve your security
DT11
|Tuesday 17:30 - 18:00|Technical demonstration