Presentations already confirmed include:
►The economic cyberwar
Federico Smith, Expert Consultant Cybercrime & Cybersecurity, Council of Europe
- General surveillance and collateral damage
- Hackers versus Crackers: the 10 typical techniques
- Cyber peace: an imperative for businesses
►Artificial Intelligence: the new frontier of threat intelligence
Xavier Creff, In charge of Threat Intelligence, Crédit Agricole
- How can security teams cope with the evolving threat landscape without being overwhelmed by the volume of information they manage?
- What are the effects of state-of-the-art technologies on cyber security?
- How AI and threat intelligence can work together
►The standards of cyber-risk
Paul Steiner, Head of Compliance, La Francaise des Jeux
- Standards and benchmarking of cyber-risk
- The relationship between cybersecurity and governance
- Cyber-risk Management: how to protect the digital assets of your users
►In a digitalising world, you can’t mention fraud without cybercrime
Yves Destrebecq, Fraud Prevention Manager, HSBC France
- Main threats overview
- The relationship between cybersecurity and the fight against fraud
- Implementation of an efficient dispositive
- When technology could block the main threats: fraud monitoring, machine learning, biometrics
►Cybersecurity in Railways
Eddy Thesee, Information System Director, Alstom
- Cybersecurity in railways: why is it so important?
- The skills gap: Resourcing remains amongst the biggest challenges. How can cybersecurity leaders develop sufficient talent and resources to succeed in a digitalising world?
- How to use, and adapt to, new technologies
- The importance of information sharing
- Cyber risk management
►Can we risk a "low cost" option when it comes to GRC programs?
Cédric Baillet, CISO, Club Med
- Taking cyber risk and compliance into account in comex and audit committees means setting up regular monitoring and associated reporting on these themes. The implementation of a governance program then becomes a necessity to guarantee action is structured, sustainable, and of high quality.
- Is it possible to approach such a program with open source or "low cost" tools and what results can be expected?
- A practical implementation on the themes of monitoring internal and third-party risks, incident logging and the implementation of controls:
- Establishing parameters
- Choosing a solution
- Illustration of the approach implemented
- Balance sheet in positive/negative form and next steps