Wednesday 24 January 2018

Click to close
THEME
PATHWAYS
Click to close
SPEAK
FORMATS
C11
|Wednesday 09:00 - 09:45|Conference
Fortinet - Cloud Security, an answer to the digital transformation
C12
|Wednesday 09:00 - 09:45|Conference
C13
|Wednesday 09:00 - 09:45|Conference
Kaspersky Lab - Threat Intelligence at a time of uncertainty
C14
|Wednesday 09:00 - 09:45|Conference
Microsoft
C15
|Wednesday 09:00 - 09:45|Conference
Sogeti
FT09
|Wednesday 09:00 - 09:15|FIC Talk
Tanium
MC07
|Wednesday 09:00 - 10:00|Master class
Rationality, Nudges & Cybersecurity
PI
|Wednesday 09:00 - 09:15|Technical demonstration
RemAuth : A Fintech-grade authentification service, plus simplicity, minus costs.
PI
|Wednesday 09:15 - 09:30|Technical demonstration
Datadome - How to protect your customers' personal data from bot traffic
FT10
|Wednesday 09:20 - 09:35|FIC Talk
Ariadnext - Mobile Identity for the Masses
DT13
|Wednesday 09:30 - 10:00|Technical demonstration
SYMANTEC – Detection, investigation and attack remediation with next-gen technologies
TV06
|Wednesday 09:30 - 10:00|TV Show
A11
|Wednesday 10:00 - 11:00|Workshop
KYC and cyber security: should clients, partners and providers now be assessed?
A12
|Wednesday 10:00 - 11:00|Workshop
CTI: how far can we go back up the “cyber kill chain”?
A13
|Wednesday 10:00 - 11:00|Workshop
Feedback on WannaCry and NotPetya
A14
|Wednesday 10:00 - 11:00|Workshop
Darknets and Darknauts
A15
|Wednesday 10:00 - 11:00|Workshop
GDPR: Instructions for compliance
A16
|Wednesday 10:00 - 11:00|Workshop
How to outsource your SOC
A17
|Wednesday 10:00 - 11:00|Workshop
Which dahsboards to address your executive committee
A18
|Wednesday 10:00 - 11:00|Workshop
Capacity Building: International cooperation put to the test
A19
|Wednesday 10:00 - 11:00|Workshop
The NIS and critical infrastructure: how to ensure compliance
A20
|Wednesday 10:00 - 11:00|Workshop
Are connected objects the « weakest links » of cyber resilience ?
DT14
|Wednesday 10:00 - 10:30|Technical demonstration
SKYBOX SECURITY - How to reduce your attack surface effectively
MC08
|Wednesday 10:00 - 11:00|Master class
Detection is dead
TV07
|Wednesday 10:00 - 10:30|TV Show
DT15
|Wednesday 10:30 - 11:00|Technical demonstration
SYSTANCIA - PAM : trust doesn't exclude control
TV08
|Wednesday 10:30 - 11:00|TV Show
MC09
|Wednesday 11:00 - 12:00|Master class
Regulation of Cyber-Attacks after the Failure of the UN GGE and Wannacry
TV09
|Wednesday 11:00 - 11:30|TV Show
P03
|Wednesday 11:15 - 13:00|Plenary Session
Can Europe win the battle over data?
DT16
|Wednesday 11:30 - 12:00|Technical demonstration
BITDEFENDER - Sophisticated threats: dissection of a fileless attack
TV10
|Wednesday 11:30 - 12:00|TV Show
Sqreen+ Alsid
DT17
|Wednesday 12:00 - 12:30|Technical demonstration
FORECOMM - Support the digital transformation of health, to the patient's benefit
MC10
|Wednesday 12:00 - 13:00|Master class
50 billion connected breaches
DT18
|Wednesday 12:30 - 13:00|Technical demonstration
TIXEO : Video conferencing security : challenges, review of the situation and solutions
A23
|Wednesday 13:30 - 15:00|Workshop
Which innovative approaches for a robust SOC-based Cyberdefense
A24
|Wednesday 13:30 - 15:00|Workshop
Digital life: local authorities on the front line
A30
|Wednesday 13:30 - 15:00|Agora
PhilosoFIC : Predictive Algorithms
A21
|Wednesday 14:00 - 15:00|Workshop
The possibility of safe and secure smart cities
A22
|Wednesday 14:00 - 15:00|Workshop
Should we fear the balkanization of the Internet?
A25
|Wednesday 14:00 - 15:00|Workshop
Training and practice: how to develop and maintain know-how and interpersonal skills
A26
|Wednesday 14:00 - 15:00|Workshop
Using agile security with Red Teaming and Bug Bounty
A27
|Wednesday 14:00 - 15:00|Workshop
DevOps: can we reconcile security and speed?
A28
|Wednesday 14:00 - 15:00|Workshop
CTI: how do we make it operational?
A29
|Wednesday 14:00 - 15:00|Workshop
Digital identity: how do we share roles?
DT19
|Wednesday 14:00 - 14:30|Technical demonstration
Rapid7 InsightIDR: the SIEM you always wanted. Incident Detection you’ll always need!
MC11
|Wednesday 14:00 - 15:00|Master class
DT20
|Wednesday 14:30 - 15:00|Technical demonstration
YAGAAN - Application security : Yag-Suite, solution for better efficiency in source code application security testing and for GDPR oriented vulnerability analysis.
DT21
|Wednesday 15:00 - 15:30|Technical demonstration
ITRUST : A SOC TO PROTECT YOU FROM WANNACRY, PETYA ... AND TO COMPLY WITH GDPR
MC12
|Wednesday 15:00 - 16:00|Master class
The untold story about threat intelligence: How MISP became a significant open source threat intelligence platform and open standards for information sharing.
C16
|Wednesday 15:15 - 16:00|Conference
Google : How to successfully harness machine learning to combat fraud and abuse ​?​
C17
|Wednesday 15:15 - 16:00|Conference
AMAZON WEB SERVICES : Cloud security at AWS is the highest priority. Learn how to protect your data with cloud-powered security
C18
|Wednesday 15:15 - 16:00|Conference
European national agencies: stakes and challenges of European cooperation in cybersecurity
C19
|Wednesday 15:15 - 16:00|Conference
GCSC - Call to Protect the Public Core of the Internet
DT22
|Wednesday 15:30 - 16:00|Technical demonstration
DATAPROTECT
FT11
|Wednesday 15:30 - 15:45|FIC Talk
HUAWEI- The digital revolution in health, the European vision of Huawei
FT12
|Wednesday 15:50 - 16:05|FIC Talk
DarkTrace - A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks
P04
|Wednesday 16:30 - 18:00|Plenary Session
What global security system for the cyberspace?