PROGRAM
IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.
2025 CONFERENCES & WORKSHOPS
DNS - From Silent Target to Your First Line of Defense
Organized by EFFICIENTIP
Continue readingDNS is often an overlooked target in the cyber kill chain, yet its strategic role makes it a powerful ally. With 90% of organizations experiencing DNS attacks and incurring an average cost of $1.1 million per incident, it's time to rethink DNS security. This session explores how to transform DNS from a silent vulnerability into your first line of defense. Discover how DNS-centric intelligence, AI-driven detection, adaptive countermeasures, and automated integration with the ecosystem help proactively secure networks while ensuring data protection, service continuity, and operational efficiency. Designed for cybersecurity and networking experts, this talk provides actionable strategies to combat rising threats and protect modern networks.
Conference Moderator:
Guillaume LE POULAIN
Customer Solution Architect – EFFICIENT IP
How to audit and secure industrial environments (OT, IIoT, SCADA, DCS, SIS… etc.)? Specific precautions and practical experience feedbacks
Organized by HOLISEUM
Continue readingThese critical systems require a specific cybersecurity approach that needs to take into account:
• The particular nature of their potential impacts, including physical, safety and environmental damage,
• Their lifecycle, which is longer than that of traditional IT systems,
• The use of proprietary protocols that are found nowhere else,
• Their governance model, involving both Technical and Executive Management,
• Their strong dependency to vendors.
In the face of increasingly sophisticated cyber threats, our experts share their practical experience gained over many years across nearly all industry sectors. This session combines feedback from actual cases and practical demonstrations to help you seize and master the stakes and challenges of this strategic domain.
Join us for an immersive dive into industrial cybersecurity, where technical expertise meets operational pragmatism.
Speaker:
Faïz DJELLOULI
CEO – HOLISEUM
How to strengthen your organisation's cyber security and consolidate NIS 2 compliance
Organized by OpenText Cybersecurity
Continue readingWith cyber threats on the increase, it's crucial for all businesses to protect themselves effectively. That's why OpenText Cybersecurity offers you a broad portfolio of cybersecurity solutions to identify and block current and future threats.
Speaker:
Clayton DE SOUSA
Senior Solutions Consultant – OPENTEXT CYBERSECURITY
Case study: protecting yourself from external threats with your nose to the grindstone
Organized by PATROWL.IO
Continue readingSecuring hundreds of assets exposed on the Internet is a modern headache for any self-respecting CISO. Continuous and permanent protection, identification of vulnerabilities without lifting a finger, qualified and prioritised information... With Patrowl, discover the experience of a French company with an international reach that has chosen to secure everything, with its fingers firmly on the pulse.
Conference Moderator:
Vladimir KOLLA
Co-founder – PATROWL.IO
Customer testimonial: How to optimize IT security through automation?
Organized by Tanium et Mediawan
Continue readingN/A
Speakers:
Pascal FABRE
CISO & infrasctructure director – MEDIAWAN
Mamoun BELAAROUSSI
Director of Strategic Accounts – TANIUM
Identity management for B2B: secure and simplify to boost performance
Organized by PING IDENTITY
Continue readingIn a world where inter-company partnerships are essential to business development, ensuring smooth and secure management of B2B identities and access is a major challenge. An optimized approach enables companies to:
- Avoid breaches related to third parties by securing access through a Zero Trust approach (98% of companies work with at least one partner that has already suffered a breach).
- Facilitate secure access to applications and services for their partners, suppliers, distributors or business customers
- Improve the user experience by offering a smooth and facilitated experience
- Strengthen trust and collaboration through precise access control
- Optimize productivity and revenue generation by streamlining processes
Modern B2B IAM solutions must integrate advanced features such as federated SSO, delegated administration, fast onboarding, access certifications, closed-loop remediation and robust integrations, among others. Join us to discover how well-designed business-to-business identity management can transform your B2B relationships into a lever for growth and security!
Speaker:
Cyril GROSJEAN
Principal Sales Engineer – PING IDENTITY
Veracode Risk Manager: Transform Your Security Posture, Minimise Risks, Maximise Efficiency.
Organized by VERACODE
Continue readingDon't miss our workshop where we will present Veracode's latest solution — an innovative tool designed to strengthen Development and Security teams.
In today's complex digital landscape, managing security risks from multiple sources — from code repositories to cloud infrastructure — has become a challenging task for organisations.
Veracode's Application Security Posture Management (ASPM) tool is designed not only to manage but also to significantly reduce your risk posture by enabling rapid and targeted corrective actions that maximise the security impact for your business. During this session, we will explore how Veracode provides clear and comprehensive visibility into your security environment, allowing you to always know your next best action.
We will delve into its capabilities, which include:
- Identifying and quickly fixing the most critical vulnerabilities with minimal effort, thanks to our advanced analysis pipeline that unifies and normalises results from various sources.
- Enhancing the efficiency of your security team by reducing cloud risks by up to 88% and saving up to 196 hours of analyst time.
- Focusing on root-cause solutions rather than being overwhelmed by variations in issues, thereby streamlining the remediation process and significantly reducing the number of queries for developers.
Discover how Veracode's targeted solutions, including updates to IaC templates and base images, can help you mitigate urgent security issues such as malicious exfiltration activities and exposure vulnerabilities.
Learn more about our integration capabilities with leading CSPs, IaC tools, and security frameworks, making Veracode an essential partner for any organisation looking to strengthen its security posture in the cloud era.
Don't miss the opportunity to discover how this tool can revolutionise your approach to cloud security, making it more strategic and less stressful. Reserve your place today and take the first step towards smarter and more efficient cloud security management!
Speaker:
Paolo RESTAGNO
VP Sales, Europe – VERACODE
Simplify your privileged access management with Prove IT administration bastion [Le Point case study]
Organized by Rubycat
Continue readingQuentin Bernard, Technical Sales Engineer at Rubycat will give you a detailed demonstration of Prove IT, the only solution currently certified "Visa de Sécurité" by The French National Security Agency (since 2018 + renewal in 2023).
He will be joined by Jean-Philippe Gramond, IT Operations Manager and Julien Voisin, Systems Administrator at Le Point newspaper, both Prove IT customer for over 3 years, to share his experience on using the solution.
They will talk about : - Le Point's IT and cybersecurity context and issues, - the benefits of setting up a bastion - the reasons for choosing the Prove IT solution - deployment, administration and maintenance of the solution
Do not miss this event if your organization wishes to secure their infrastructure and effectively manage privileged access and accounts !
Conference Moderators:
Cathy LESAGE
CEO – RUBYCAT
Quentin BERNARD
Technical Sales Engineer – RUBYCAT
Speakers:
Jean-Philippe GRAMOND
IT Operation Manager – LE POINT
Julien VOISIN
Systems Administrator in charge of Editorial Technologies – LE POINT
CAL&F & ARCAD Software drastically reduce the impact of data breaches with DOT Anonymizer
Organized by ARCAD SOFTWARE
Continue readingIn a digital environment where cyberthreats are omnipresent, the protection of sensitive data has become a top priority for companies. CAL&F, a subsidiary of the Crédit Agricole Group, present in 11 countries with more than 300 interconnected applications, has taken up the challenge of data anonymization to comply with European regulations such as GDPR, NIS 2 and DORA.
With concrete feedback, the DPO Group of CA L&F, Blaise Diagne will address:
- The implementation of a data anonymization project in a complex IS.
- The benefits obtained in terms of regulatory compliance, protection against data theft and optimization of data governance.
- The challenges encountered and the solutions provided to ensure homogeneous and functionally coherent anonymization.
This presentation will offer you valuable insights into:
- Best practices for data anonymization in complex environments.
- Strategies for reducing the impact of data leaks, including for obsolete data.
- Tools and methods for improving the resilience and financial performance of your company through optimized data management.
Don't miss this opportunity to talk to our expert and Top Decision-Maker, Blaise Diagne, and find out how CAL&F and ARCAD Software have collaborated to transform the challenges of data anonymization into performance and security levers.
Speaker:
Blaise DIAGNE
Data Protection Officer – CRÉDIT AGRICOLE LEASING & FACTORING
Cybercrime and the human factor: Understanding trends for better protection.
Organized by SOSAFE
Continue readingModerated by : Shirley Hora, Expert in cyber security awareness at SoSafe.
On the programme:
- Deciphering emerging threats
- The new tactics of cybercriminals
- Strategies for better protection
A key opportunity to anticipate tomorrow's challenges.
Conference Moderator:
Shirley HORA
Expert in cyber security awareness at SoSafe – SOSAFE
Effectively Managing Human Risk in Cyber Security
Organized by KnowBe4
Continue readingThis presentation will explore effective cyber risk management as the key to aligning defensive measures with actual risks. Learn how to identify, evaluate, and prioritize threats before implementing impactful mitigation strategies—focusing on one of the most overlooked and underestimated factors: human behavior.
Speaker:
Vincent PORTE
Enterprise Account Manager – KNOWBE4
Keep your cloud infrastructure secure with Cyberwatch
Organized by CYBERWATCH
Continue readingFor several years now, businesses have been moving their data and applications from on-premises hosting to cloud environments. Cloud-based services and applications offer enormous advantages in terms of productivity and flexibility. However, by being exposed to the Internet, they also present a greater risk of security threats. These threats are exacerbated by the proliferation of cloud providers and hybridisation with on-premise mode.
Come and find out how Cyberwatch can help you manage your vulnerabilities and compliance centrally in these new, complex environments.
Vincent Champain, Senior Executive Vice President, Digital and Information Systems at Framatome, will be sharing his experience of the Framatome Group.
Speaker:
Vincent CHAMPAIN
Senior Executive Vice President, Digital and Information Systems – FRAMATOME