Agenda

08:30 - 09:20

Registration & Networking

09:20 - 09:30

Chairman's Welcome

09:30 - 09:50

► Share more to protect everyone 

Bertrand Blond, Director of Cyberdefense Information Systems, Commandement de la Cyberdéfense

  • French Cyber Command activities 
  • The third-party supply chain, observations and developments 
  • MINARM/SUPPLY CHAIN agreement: creation, objectives and implementation/achievements
09:50 - 10:20

► Cyber Threats: What You’re Up Against & How to Defend with PAM 

Matthieu Jouzel, Senior Solutions Engineer, BeyondTrust 

How do you break the attack chain and establish a solid foundation for successful security projects?

In this session, we will discuss together:

  • What are the most common entry points in an attack chain?
  • What steps can you take to block these entries?
  • How does PAM ensure the success of a security project and significantly reduce the risk of attacks?
10:20 - 10:50

► How to Strengthen Your Organization's Last Line of Defense: Your Human Firewall

Vincent Porte, Regional Enterprise Account Manager, KnowBe4

Social Engineering attacks, in the form of phishing, BEC, and Ransomware attacks are becoming ever more commonplace. The number of cyberattacks that start by manipulating a human into allowing access to protected systems or sensitive information steadily increases.The email filters have an average 7-10% failure rate, companies need a strong human firewall as the last line of defense.In this talk, Vincent Porte, Regional Enterprise Account Manager, helps you better understand how you can keep your users on their toes with security top of mind.Get actionable insights on:

  • Who is KnowBe4
  • How can KnowBe4 make a difference
  • Why it isn't about just providing training to employees, but doing it right
10:50 - 11:20

Networking Break

11:20 - 11:40

► One CISOs Approach to Proactive Defence 

Maran Madiajagane, Group CISO, RAJA Group 

  • Threat Intel: Be the first to know your threats 
  • SOC: Strategy,  Coverage and Remediation 
  • Incident Response: Procedures and Playbooks 
11:40 - 12:10

► Your data is in the Cloud? How will you protect them tomorrow under quantum threat?

Eric Piroux, Business Development Director Cybersecurity | Digital Trust, EMEA Center of Excellence, Entrust

  • Control and management of risks related to data security in the cloud and networks
  • A Zero Trust approach to prevent the compromise of systems and data
  • A holistic approach based on trust, compliance, and ready for Post-Quantum cryptography

 

12:10 - 12:40

► The next class of browser-based attacks

Tom McVey, Solutions Architect, Menlo Security

There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics at the vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances of success.

Between July and December 2021, there was a 224% increase in highly evasive adaptive threats (HEAT) attacks – a class of cyber threats targeting web browsers as the attack vector. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically-generated threat toolkit built in the web where employees are productive.

In this session you will: 

  • Discover the anatomy of recent browser-based attacks
  • Learn why network security today is broken
  • Experience a live demo that enables you to discover the technology approach proven to eliminate these threats
12:40 - 13:00

► The Challenges of Supply Chain Management 

Elisabeth Ly, CISO, Siemens SAS

  • Risk management - What is the key to strategy? 
  • Integrating technology into the supply chain - Questions to ask yourself before jumping in  
  • Inter-company collaboration - we are all in this together  

 

13:00 - 14:00

Lunch and Networking Break 

14:00 - 14:20

► The Vulnerability Vector: An opportunity for the hacker and a challenge for the CISO 

Thomas Degardin, Group CISO, Bouygues SAJuan Carlos López Ruggiero, CISO, Bouygues Energies & Services 

  • Malicious actors are so much better organised (and financed) than company CISOs
  • How do we survive the threats and stay one step ahead?
  • What works and what doesn’t when facing the challenges in an ever-changing scenario?
14:20 - 14:50

► Cybersecurity threats to the digital transformation of businesses 

Karthik Ananda Rao, Chief Evangelist, ManageEngine

Cybersecurity threats have become a common occurrence these days. With digital transformation taking over every aspect of business, IT administrators are working 24/7 to keep attacks and hackers at bay. Round-the-clock monitoring on all aspects of business security is needed to provide a safe and secure environment for both internal and external users.

  • Learn the top 10 security threats in the world of digital transformation
  • Know how to mitigate them with easy to use on-premise and on-cloud solutions
  • Insights on Cloud gaining momentum these days in the period of lock down across the globe
14:50 - 15:10

► Cybersecurity Insurance: Finding the Best Protection for your Business

Ezechiel Symenouh, Cyber Underwriter - France, Benelux & Nordics, Tokio Marine HCC

  • The current threat landscape
  • Assessing your cybersecurity maturity
  • Cyber insurance market 2023
15:10 - 15:40

Networking Break

15:40 - 16:20

► Panel: Future Challenges Discussion

Maran Madiajagane, Group CISO, RAJA Group (Moderator);
Nicolas Burtin,
Director of Security and Operational Resilience, Generali France;
Antoine Bajolet,
RSSI, Henner Group;
Grégory Boghossian,
Deputy Director Information Security, La Banque Postal

This panel will look at the challenges posed by:  

  • Asset inventories (devices, applications, identity, network, data)  
  • Overall technology landscape complexity 
  • ‘Digital’ transformations of the business / products  
  • Testing and measuring the effectiveness of the cybersecurity control environment  
  • Incident response and problem management  
  • Ensuring the same coverage/visibility over cloud environments as on-prem  
  • Managing supply chain risk in a world less tolerant to long delays around supplier assurance (post covid)  
  • Web 3.0 and the next generation of the internet: securing new technologies and services which are inherently decentralised?  
16:20

Conference Close

Education seminars


The next class of browser-based attacks


Tom McVey, Soltuions Architect, Menlo Security

There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics at the vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances of success.

Between July and December 2021, there was a 224% increase in highly evasive adaptive threats (HEAT) attacks – a class of cyber threats targeting web browsers as the attack vector. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically-generated threat toolkit built in the web where employees are productive.

In this session you will: 

  • Discover the anatomy of recent browser-based attacks
  • Learn why network security today is broken
  • Experience a live demo that enables you to discover the technology approach proven to eliminate these threats

How to Strengthen Your Organization's Last Line of Defense: Your Human Firewall


Vincent Porte, Regional Enterprise Account Manager, KnowBe4

Social Engineering attacks, in the form of phishing, BEC, and Ransomware attacks are becoming ever more commonplace. The number of cyberattacks that start by manipulating a human into allowing access to protected systems or sensitive information steadily increases.The email filters have an average 7-10% failure rate, companies need a strong human firewall as the last line of defense.In this talk, Vincent Porte, Regional Enterprise Account Manager, helps you better understand how you can keep your users on their toes with security top of mind.Get actionable insights on:

  • Who is KnowBe4
  • How can KnowBe4 make a difference
  • Why it isn't about just providing training to employees, but doing it right