PROGRAM
IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.
2025 CONFERENCES & WORKSHOPS
DNS - From Silent Target to Your First Line of Defense
Organized by EFFICIENTIP
Continue readingDNS is often an overlooked target in the cyber kill chain, yet its strategic role makes it a powerful ally. With 90% of organizations experiencing DNS attacks and incurring an average cost of $1.1 million per incident, it's time to rethink DNS security. This session explores how to transform DNS from a silent vulnerability into your first line of defense. Discover how DNS-centric intelligence, AI-driven detection, adaptive countermeasures, and automated integration with the ecosystem help proactively secure networks while ensuring data protection, service continuity, and operational efficiency. Designed for cybersecurity and networking experts, this talk provides actionable strategies to combat rising threats and protect modern networks.
Conference Moderator:
Guillaume LE POULAIN
Customer Solution Architect – EFFICIENT IP
How to audit and secure industrial environments (OT, IIoT, SCADA, DCS, SIS… etc.)? Specific precautions and practical experience feedbacks
Organized by HOLISEUM
Continue readingThese critical systems require a specific cybersecurity approach that needs to take into account:
• The particular nature of their potential impacts, including physical, safety and environmental damage,
• Their lifecycle, which is longer than that of traditional IT systems,
• The use of proprietary protocols that are found nowhere else,
• Their governance model, involving both Technical and Executive Management,
• Their strong dependency to vendors.
In the face of increasingly sophisticated cyber threats, our experts share their practical experience gained over many years across nearly all industry sectors. This session combines feedback from actual cases and practical demonstrations to help you seize and master the stakes and challenges of this strategic domain.
Join us for an immersive dive into industrial cybersecurity, where technical expertise meets operational pragmatism.
Speaker:
Faïz DJELLOULI
CEO – HOLISEUM
How to strengthen your organisation's cyber security and consolidate NIS 2 compliance
Organized by OpenText Cybersecurity
Continue readingWith cyber threats on the increase, it's crucial for all businesses to protect themselves effectively. That's why OpenText Cybersecurity offers you a broad portfolio of cybersecurity solutions to identify and block current and future threats.
Speaker:
Clayton DE SOUSA
Senior Solutions Consultant – OPENTEXT CYBERSECURITY
Case study: protecting yourself from external threats with your nose to the grindstone
Organized by PATROWL.IO
Continue readingSecuring hundreds of assets exposed on the Internet is a modern headache for any self-respecting CISO. Continuous and permanent protection, identification of vulnerabilities without lifting a finger, qualified and prioritised information... With Patrowl, discover the experience of a French company with an international reach that has chosen to secure everything, with its fingers firmly on the pulse.
Conference Moderator:
Vladimir KOLLA
Co-founder – PATROWL.IO
Identity management for B2B: secure and simplify to boost performance
Organized by PING IDENTITY
Continue readingIn a world where inter-company partnerships are essential to business development, ensuring smooth and secure management of B2B identities and access is a major challenge. An optimized approach enables companies to:
- Avoid breaches related to third parties by securing access through a Zero Trust approach (98% of companies work with at least one partner that has already suffered a breach).
- Facilitate secure access to applications and services for their partners, suppliers, distributors or business customers
- Improve the user experience by offering a smooth and facilitated experience
- Strengthen trust and collaboration through precise access control
- Optimize productivity and revenue generation by streamlining processes
Modern B2B IAM solutions must integrate advanced features such as federated SSO, delegated administration, fast onboarding, access certifications, closed-loop remediation and robust integrations, among others. Join us to discover how well-designed business-to-business identity management can transform your B2B relationships into a lever for growth and security!
Speaker:
Cyril GROSJEAN
Principal Sales Engineer – PING IDENTITY
Veracode Risk Manager: Transform Your Security Posture, Minimise Risks, Maximise Efficiency.
Organized by VERACODE
Continue readingDon't miss our workshop where we will present Veracode's latest solution — an innovative tool designed to strengthen Development and Security teams.
In today's complex digital landscape, managing security risks from multiple sources — from code repositories to cloud infrastructure — has become a challenging task for organisations.
Veracode's Application Security Posture Management (ASPM) tool is designed not only to manage but also to significantly reduce your risk posture by enabling rapid and targeted corrective actions that maximise the security impact for your business. During this session, we will explore how Veracode provides clear and comprehensive visibility into your security environment, allowing you to always know your next best action.
We will delve into its capabilities, which include:
- Identifying and quickly fixing the most critical vulnerabilities with minimal effort, thanks to our advanced analysis pipeline that unifies and normalises results from various sources.
- Enhancing the efficiency of your security team by reducing cloud risks by up to 88% and saving up to 196 hours of analyst time.
- Focusing on root-cause solutions rather than being overwhelmed by variations in issues, thereby streamlining the remediation process and significantly reducing the number of queries for developers.
Discover how Veracode's targeted solutions, including updates to IaC templates and base images, can help you mitigate urgent security issues such as malicious exfiltration activities and exposure vulnerabilities.
Learn more about our integration capabilities with leading CSPs, IaC tools, and security frameworks, making Veracode an essential partner for any organisation looking to strengthen its security posture in the cloud era.
Don't miss the opportunity to discover how this tool can revolutionise your approach to cloud security, making it more strategic and less stressful. Reserve your place today and take the first step towards smarter and more efficient cloud security management!
Speaker:
Paolo RESTAGNO
VP Sales, Europe – VERACODE
Simplify your privileged access management with Prove IT administration bastion [Le Point case study]
Organized by Rubycat
Continue readingQuentin Bernard, Technical Sales Engineer at Rubycat will give you a detailed demonstration of Prove IT, the only solution currently certified "Visa de Sécurité" by The French National Security Agency (since 2018 + renewal in 2023).
He will be joined by Jean-Philippe Gramond, IT Operations Manager and Julien Voisin, Systems Administrator at Le Point newspaper, both Prove IT customer for over 3 years, to share his experience on using the solution.
They will talk about : - Le Point's IT and cybersecurity context and issues, - the benefits of setting up a bastion - the reasons for choosing the Prove IT solution - deployment, administration and maintenance of the solution
Do not miss this event if your organization wishes to secure their infrastructure and effectively manage privileged access and accounts !
Conference Moderators:
Cathy LESAGE
CEO – RUBYCAT
Quentin BERNARD
Technical Sales Engineer – RUBYCAT
Speakers:
Jean-Philippe GRAMOND
IT Operation Manager – LE POINT
Julien VOISIN
Systems Administrator in charge of Editorial Technologies – LE POINT
Cybercrime and the human factor: Understanding trends for better protection.
Organized by SOSAFE
Continue readingModerated by : Shirley Hora, Expert in cyber security awareness at SoSafe.
On the programme:
- Deciphering emerging threats
- The new tactics of cybercriminals
- Strategies for better protection
A key opportunity to anticipate tomorrow's challenges.
Conference Moderator:
Shirley HORA
Expert in cyber security awareness at SoSafe – SOSAFE
Human Risk Management: Three Key Ways to Strengthen Cybersecurity
Organized by KnowBe4
Continue readingEffective Human Risk Management is an essential component of an organization's cybersecurity. We highlight three perspectives describing Human Risk Management's contribution to an organization's cybersecurity. Central to this is human action within the workforce that conserves defense resources, aids in triaging suspicious emails, strengthens processes, and promotes active defense through real-time coaching. These three strategies offer a comprehensive methodology for optimizing cybersecurity and emphasize the importance of an integrated approach considering both technical and human factors.
This session will be exploring:
- Reduce incident reporting and focus on defense
- Leverage human and machine intelligence for the triage of suspicious emails
- Strengthen processes and promote active defense through real-time coaching
Speaker:
Vincent PORTE
Enterprise Account Manager – KNOWBE4
Keep your cloud infrastructure secure with Cyberwatch
Organized by CYBERWATCH
Continue readingFor several years now, businesses have been moving their data and applications from on-premises hosting to cloud environments. Cloud-based services and applications offer enormous advantages in terms of productivity and flexibility. However, by being exposed to the Internet, they also present a greater risk of security threats. These threats are exacerbated by the proliferation of cloud providers and hybridisation with on-premise mode.
Come and find out how Cyberwatch can help you manage your vulnerabilities and compliance centrally in these new, complex environments.
Vincent Champain, Senior Executive Vice President, Digital and Information Systems at Framatome, will be sharing his experience of the Framatome Group.
Speaker:
Vincent CHAMPAIN
Senior Executive Vice President, Digital and Information Systems – FRAMATOME