Tuesday 23 January 2018

Click to close
THEME
PATHWAYS
Click to close
SPEAK
FORMATS
P01
|Tuesday 09:00 - 11:30|Plenary Session
Cyber resilience: fantasy or reality?
DT01
|Tuesday 11:00 - 11:30|Technical demonstration
BOMGAR - Six steps to secure access: methodology and user experiences
MC01
|Tuesday 11:00 - 12:00|Master class
A01
|Tuesday 11:30 - 13:00|Workshop
Cloud Computing: what will change with GDPR
A02
|Tuesday 11:30 - 13:00|Workshop
How international cooperation can deal with Ransomware
A03
|Tuesday 11:30 - 12:30|Workshop
How to link SOCs and crisis management
A04
|Tuesday 11:30 - 13:00|Agora
Parliamentary Agora: Reviving a Digital Europe
A05
|Tuesday 11:30 - 12:30|Workshop
Business continuity & Disaster Recovery Plans : the keys to success
A06
|Tuesday 11:30 - 13:00|Workshop
How do we harmonize our certification outlines to reconcile different requirement levels?
A07
|Tuesday 11:30 - 13:00|Workshop
Cyber Threat Intelligence: what is its real added value?
A08
|Tuesday 11:30 - 12:30|Workshop
Security by design, a new commercial and industrial imperative
A09
|Tuesday 11:30 - 12:30|Workshop
Should Hack Back be authorized for private corporations?
A10
|Tuesday 11:30 - 12:30|Workshop
Cyber-Jidahism: public/private cooperation put to the test
DT02
|Tuesday 11:30 - 12:00|Technical demonstration
ADVENS : SOC : Build your effective monitoring plan to handle new threats
TV01
|Tuesday 11:30 - 12:00|TV Show
DT03
|Tuesday 12:00 - 12:30|Technical demonstration
SPLUNK : FOC or SOC ?
MC02
|Tuesday 12:00 - 13:00|Master class
Cybersecurity industrial policy: international comparison
TV02
|Tuesday 12:00 - 12:30|TV Show
DT04
|Tuesday 12:30 - 13:00|Technical demonstration
SCILLE : WHAT IF THE CLOUD BECOMES THE SAFEST PLACE FOR YOUR CONFIDENTIAL DATA ?
TV03
|Tuesday 12:30 - 13:00|TV Show
FT01
|Tuesday 13:00 - 13:15|FIC Talk
OKTA : Plan for success with Identity through MFA !
MC03
|Tuesday 13:00 - 14:00|Master class
Information Warfare and Hacking Democracy
FT02
|Tuesday 13:20 - 13:35|FIC Talk
DXC TECHNOLOGY: Secure and accelerate your digital transformation thanks to DXC Cyber Reference Architecture
FT03
|Tuesday 13:40 - 13:55|FIC Talk
ARUBA - Inner perimeter protection
DT05
|Tuesday 14:00 - 14:30|Technical demonstration
NES & Cymulate: « Breach & Attack Simulation Technologies »
FT04
|Tuesday 14:00 - 14:15|FIC Talk
IBM
MC04
|Tuesday 14:00 - 15:00|Master class
TV04
|Tuesday 14:00 - 14:30|TV Show
C01
|Tuesday 14:15 - 15:00|Conference
Akamai : Credential abuse challenges typical bot management strategies
C02
|Tuesday 14:15 - 15:00|Conference
NAVAL GROUP - CYBER SECURITY NEEDS VS MARKET REALITY : OPERATIONAL FEEDBACK FROM AN INDUSTRIAL NAVAL PLAYER
C03
|Tuesday 14:15 - 15:00|Conference
OVH - GDPR compliance in 3 clicks
C04
|Tuesday 14:15 - 15:00|Conference
Threat Intelligence and reverse, knowledge and follow-up of the threat
C05
|Tuesday 14:15 - 15:00|Conference
F-Secure - Red teaming: The value of testing your security by breaking in
DT06
|Tuesday 14:30 - 15:00|Technical demonstration
CERTILIENCE - Guarantee the security of your IS through continued control of the maintenence
TV05
|Tuesday 14:30 - 15:00|TV Show
DT07
|Tuesday 15:00 - 15:30|Technical demonstration
JUNIPER NETWORKS
FT05
|Tuesday 15:00 - 15:15|FIC Talk
Axians Cybersecurity Paris, Vinci Energies group: Smart cities: towards the end of privacy ?
MC05
|Tuesday 15:00 - 16:00|Master class
FT06
|Tuesday 15:20 - 15:35|FIC Talk
Wavestone : NotPetya: behind the scenes of incident response and lessons learned
C06
|Tuesday 15:30 - 16:15|Conference
Engie Ineo: RETEX of Industrial IS audits on the 3S model: SENSITIZING, SECURING, SUPERVISING
C07
|Tuesday 15:30 - 16:15|Conference
THALES - Threat hunting: tracking down APT by large-scale analysis of indicators of compromise
C08
|Tuesday 15:30 - 16:15|Conference
Trend Micro - 2020: Connected Intelligence
C09
|Tuesday 15:30 - 16:15|Conference
Orange
C10
|Tuesday 15:30 - 16:15|Conference
PALO ALTO NETWORKS
DT08
|Tuesday 15:30 - 16:00|Technical demonstration
Microsoft Domain Security Audit
FT07
|Tuesday 15:40 - 15:55|FIC Talk
Sophos : Next-Gen Endpoint, Machine Learning – New buzzwords or real necessities of change?
FT08
|Tuesday 16:00 - 16:15|FIC Talk
Blackberry - Turning the tables on the cyber criminals targeting enterprises and government organisations
MC06
|Tuesday 16:00 - 17:00|Master class
Proliferation of cyberweapons and international law
DT09
|Tuesday 16:30 - 17:00|Technical demonstration
QUALYS - Agile, rapid app development and deployment must be secure. Qualys adds “Sec” to “DevOps”
P02
|Tuesday 16:45 - 19:00|Plenary Session
What innovation for cybersecurity?
DT10
|Tuesday 17:00 - 17:30|Technical demonstration
CYBERWATCH - Manage your vulnerabilities with Cyberwatch to improve your security
DT11
|Tuesday 17:30 - 18:00|Technical demonstration