PROGRAM
IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.
2024 CONFERENCES & WORKSHOPS
NIS 2: When cyber risk analysis and management become European obligations
Organized by EGERIE
Continue readingAdopted at the end of 2022, the NIS2 directive is now in the hands of member states, which have until October of this year to transpose it.
- What are the new obligations in terms of cyber risk analysis and management?
- Who is affected?
- What are the consequences of non-compliance?
- How can technical constraints be transformed into business opportunities?
Let's take stock and anticipate this strategic and structuring issue for your organizations at our EGERIE workshop.
Speaker:
Bruno GUILLOUX
Sales Director France – EGERIE
Navigating Exposure Management - a CISO’s Perspective for 2024
Organized by PENTERA
Continue readingJoin Nicolas Bernetti, CISO at GIDE LOYRETTE NOUEL as he shares his journey to reduce exposure and manage security gaps with Automated Security Validation. He will reveal the challenges he faced and how he overcame them to increase his organization’s overall security posture.
Speakers:
William CULBERT
REGIONAL DIRECTOR – PENTERA
Nicolas BERNETTI
CISO – GIDE LOYRETTE NOUEL
Why is patch management still essential in 2024?
Organized by Tanium et Trescal
Continue readingFind out how the Trescal Group has solved the patch management issue by accelerating the time to patch and simplifying the process of delivering compliance, to reduce the risk of security breaches, thanks to Tanium’s Converged Endpoint Management (XEM) solution. Alexandre Le Darz, IT Infrastructure Engineer at the Trescal Group, will talk to us about his challenges, and the implementation and explain the various advantages of his chosen solution.
Trescal is the world's specialist in metrology services and test and measurement instrument fleet management.
Conference Moderator:
Mamoun BELAAROUSSI
Director, Emerging Enterprise – TANIUM
Speakers:
Alexandre LE DARZ
IT Infrastructure Engineer – TRESCAL
Sebastien EPAILLARD
Director, Technical Solutions Engineer – TANIUM
Ransomware dry run: Feedback from CISOs on an innovative and unique solution for simulating real-life ransomware attacks
Organized by Holiseum
Continue reading"What would happen if you, too, were to suffer a ransomware attack?" This is the simple question that the Ransomware Dry Run™ will answer.
The Ransomware Dry Run™ is the first offer on the market to simulate a sophisticated ransomware attack in actual conditions thanks to a ransomware of our own design, stripped of its malicious payload but reproducing the most advanced evasion techniques in terms of installation, encryption, data extraction or network propagation. Acting just like a vaccine, our ransomware is inoculated voluntarily in some machines (patients zero) of our clients’ information systems in order to challenge the defenses in place and thus, establish the level of exposure to the specific ransomware threat.
HOLISEUM received two innovation awards in 2021 (Innovation Award at the Cybersecurity «Cas d’Or» and Gold Medal Winner at the CyberNight Innovation Competition) and several positive public testimonials from significant customers.Today, our customers are sharing their experience of this unique solution: the Ransomware Dry Run™. Constantly evolving in line with the latest developments in cyber extortion techniques, the Ransomware Dry Run™ will be presented to you by Faïz Djellouli, CEO of Holiseum, and Renaud Lifchitz, Chief Scientific Officer of Holiseum.
Speakers:
Faïz DJELLOULI
CEO – HOLISEUM
Renaud LIFCHITZ
Chief Scientific Officer - IT & IoT Security Expert – HOLISEUM
Navigate through your Cyber Threat with Open CTI
Organized by OWN
Continue readingDecentralised identity: give users control over access (CIAM)
Organized by PING IDENTITY
Continue readingDecentralised identity solutions give users back the power to manage their personal data. They create a cornerstone of trust between the user, the issuers of identity attributes and the certifiers who guarantee their authenticity. Companies that are able to anticipate these changes and implement them have a competitive advantage in terms of optimising their processes, controlling their costs and streamlining their customer relations. Join this Ping Identity session to learn more about decentralised identity in the context of CIAM.
Speaker:
Philippe DUBUC
Principal Solution Architect – PING IDENTITY
Feedback: why good practice is no longer enough in the face of today’s threats
Organized by PATROWL
Continue readingInsights from DIOT-SIACI's CISO, the undisputed French market leader in insurance consulting, management and training, who faces the daily challenges of securing his company’s exposure to the Internet.
Find out why, in today’s fiercely competitive environment, it’s vital to implement innovative solutions to effectively combat new threats, and above all, how to avoid the proliferation of vendor solutions.Conference Moderator:
Vladimir KOLLA
Co-founder – PATROWL
Speaker:
Insurance Company RSSI
RSSI – DIOT-SIACI
Embrace DDI and DNS observability to combat cyberthreats and optimize your network operations and performance
Organized by EFFICIENTIP
Continue readingNetwork infrastructure has undergone profound changes in recent years, resulting in increased complexity. Network teams are now challenged to manage, operate, and protect networks, struggling with limited visibility, data overload, and security vulnerabilities.
Join us for an enlightening session on how DDI and DNS observability is a game-changer, providing comprehensive, actionable insights into your infrastructure and helping to build full-stack observability. We'll explore:
-
Why you need DDI observability
-
The strategic importance of DNS-centric intelligence
-
Real use cases and benefits achieved
Don't miss this opportunity to learn why evolving your observability solutions is the next big thing in IT, and why DDI Observability is pivotal for identifying and resolving network issues.
Conference Moderator:
Guillaume LE POULAIN
Customer Solutions Architect – EFFICIENTIP
RETEX Transports Mauffrey : Simply control and audit your privileged access with the PROVE IT administration bastion.
Organized by RUBYCAT
Continue readingDamien Sibille, Head of the Networks and Security Department within the MAUFFREY group, one of the leading French freight transport companies, will share his experience regarding the role and importance of a PAM - Administration Bastion for controlling and tracing access (privileged internal and external users) to sensitive SI equipment.
He will explain why the MAUFFREY group chose the PROVE IT software solution from Rubycat in March 2023.
Damien Sibille will return:
- The context and IT & cybersecurity issues of transport MAUFFREY.
- The benefit of setting up a bastion (population, type of information accessed, turnover, etc.).
- The deployment, administration and maintenance of the PROVE IT solution.
Quentin Bernard, technical sales engineer at Rubycat, will give a detailed presentation of the PROVE IT software solution.
A workshop not to be missed to discover a complete and concrete testimony, in interaction with the editor Rubycat, for organizations wishing to secure their infrastructure and effectively manage access and privileged accounts.
Speaker:
Damien SIBILLE
Manager of the networks and security division – TRANSPORT MAUFFREY
Cybercrime Trends 2024
Organized by SOSAFE
Continue readingCybercriminals are always innovating, instrumentalizing new technologies and current events for their success. More than ever, staying ahead of the evolving cyber threat landscape is key to keep up with cybercriminals, strengthening resilience to security risks. Embark on a gripping journey into the heart of the digital underworld with our talk: It will empower you to know about emerging threats, identify early signs of an attack, and respond effectively.
Speaker:
Andrea GERRESHEIM
Cybersecurity Awareness Expert – SOSAFE
DevSecOps: observability for application security
Organized by DYNATRACE
Continue readingHow can you optimize the vulnerability management of your applications throughout their entire lifecycle? What is the key to meeting the growing demand for rapid development while controlling security risks?
During this workshop, you'll discover how we can go beyond Dynatrace's traditional core business of observability to help you detect vulnerabilities in real time, continuously, from the development phase right through to production. And so protect your organization against growing attacks, while accelerating the release cycle through better DevSecOps collaboration.
Frédéric Farjon, in charge of the AppSec offering, will shed light on all these issues, and explain how you can turn application vulnerability into a bug like any other within your company.
Towards a passwordless future
Organized by LASTPASS
Continue readingCompanies see a wide range of benefits in implementing passwordless authentication - including improved security posture, consolidation of their technology stack, reduced pressure on IT resources and improved user experience.
When it comes to authenticating your employees, the multiplicity of methods makes for a complex technology stack. What if there was a simpler solution? One that could consolidate your tools while doing away with a login method that relies heavily on human behavior - passwords.
Find out more:
- Why companies are turning to passwordless authentication to secure their data;
- How and when they plan to implement passwordless technology within their organization;
- The important role of passkeys in this passwordless future.
How securing your applications, APIs and data will help you comply with the NIS2 directive and new regulations
Organized by IMPERVA A THALES COMPANY
Continue readingData and APIs are currently major blind spots in terms of security, and are increasingly being exploited as part of supplychain attacks.
In fact, according to Gartner, by 2024, misuse of APIs and associated data breaches will double.
On the eve of the NIS2 regulatory changes, find out what security practices you need to adopt for your data and APIs in an on-premises, hybrid and/or multi-cloud environment.
This workshop will enable you to learn more about NIS2, security methods and tools such as discovery and classification, vulnerability analysis and behavioural analysis.
Speakers:
Mohamed LALLOUCH
Data Security Specialist – IMPERVA A THALES COMPANY
Mehdi BOUMAIZA²
Application Security Specialist – IMPERVA A THALES COMPANY