Agenda

08:00 - 08:50

Registration and Networking

08:50 - 09:00

Chairperson's Welcome 

09:00 - 09:20

► The CISO in The Age of Disorder

Benoit Moreau, CISO, Nexter

  • CISO and Compliance
  • How to maintain central control
  • The role of the SOC
09:20 - 09:40

► The Zero Trust Concept and Privileged Access Management (PAM)

Matthieu Jouzel, Solutions Engineer, BeyondTrust

  • The Zero Trust Approach - What is Zero Trust and how can you minimise your attack surface?
  • Understand the obstacles to Zero Trust in order to find the best way to secure your environment.
  • How does privileged access management align with and enable Zero Trust?
09:40 - 10:00

► Manage Third-Party Risk in Real Time With Intelligence

Soufyane Sassi, Sales Engineer - South EMEA, Recorded Future

  • Gain a real-time, objective view of your third-party risk profiles
  • Identify more third-party risks before they impact your organisation
  • Respond quickly with the detailed evidence required to understand and act on risk events
10:00 - 10:20

► Playing by the rules: regulatory compliance in a hyper-connected world

Sabine Marcellin, Digital & Cybersecurity Lawyer, DLGA

  • Data protection regulation (GDPR, Schrems II, etc) has been a huge driver of change in cybersecurity, affecting priorities, budgets and board-level awareness.
  • But there’s more change to come. Between remote working, data-driven digital transformation and IoT proliferation, sensitive data flows are no longer restricted to the traditional corporate IT network.
  • What are the implications for regulatory compliance?
10:20 - 10:50

► Education Seminars Session 1

Delegates will be able to choose from the following education seminars:

  • Why unconditional network access is a recipe for a digitalisation disaster, Nicolas Liard,​ Solutions Engineer, Bitglass & Valentin Jangwa Regional Sales Director, Southern Region, Bitglass

  • How does your security perform? Valentin Lejop, Security Systems Engineer, Keysight Technologies 

10:50 - 11:20

Networking break 

11:20 - 11:40

► Case Study: Securing Europe’s hospitals

Philippe Tourron, RSSI, Assistance Publique – Hôpitaux de Marseille

  • The public health crisis has put healthcare, and hospitals in particular, under immense pressure.
  • During this time, cybersecurity in the sector is both more challenging and more critical than ever.
  • What are the lessons we have learned and the challenges we have overcome?
  • Case Study: how the SafeCare project is securing Europe’s hospitals
11:40 - 12:00

► Protecting Online Services with Digital Intelligence

Stephen Topliss, VP Marketing Planning, Global Fraud & Identity & Johanne Ulloa, Director Solutions Consulting, Southern Europe, LexisNexis Risk Solutions

The Covid pandemic has resulted in accelerated digital transformation as more consumer services are rapidly made available online. Consumer digital adoption grows as cybercriminals explore new opportunities. How do you balance an optimal user onboarding and authentication experience with a zero trust approach?

  • Learn how different user groups are more at risk
  • Differentiate between good users and attackers with digital intelligence
  • Enhance your Customer Identity Access Management approach with layered defenses
12:00 - 12:20

► CISOs, Complexity, Containment (and other C-words)

Thom Langford, Security Advocate, SentinelOne 

  • Why traditional protective approaches are no longer effective enough.
  • How complexity has made the CISO’s ability to respond more difficult.
  • The importance of automation in the response process to address this paradigm shift CISOs now face.
12:20 - 12:40

► NAVIGATING THE UNC2452 INTRUSION CAMPAIGN 

David Grout, CTO EMEA, FireEye 

In December 2020, FireEye Mandiant was the first company to discover and report a global intrusion campaign conducted by a group of actors referred to as UNC2452.

During this session we will::

  • Talk about attribution and UNC naming
  • Dig into the campaign itself and the techniques and tactics used by the attackers
  • Discuss the key takeaways
  • Examine the added value that FireEye Mandiant can bring to organisations to make them better prepared

 

12:40 - 13:10

► Education Seminars Session 2

Delegates will be able to choose from the following education seminars:

  • The most effective way to get to highlight and address supply chain risk, Davide Turina Country Manager & Technical Director – France, Cybersel & Christophe Leautey - Regional Sales Director, BitSight 

  • Cyber security threats to the digital transformation of businesses, Mr A Karthik, Chief Evangelist, ManageEngine

13:10 - 14:10

Lunch and Networking 

14:10 - 14:30

► Security for 2021 and beyond: the CISO’s key opportunities

Eric Singer, CISO, Schneider Electric

  • The initial chaos as organisations rushed to go digital a year ago has abated - but the pace of digital transformation is not slowing.
  • How can CISOs ensure that security and privacy are proactively considered and built-in to digital projects from the start?
  • What can CISOs do to promote security culture and help employees work as a ‘human firewall’?
14:30 - 14:50

► Securing the New Normal: How Cyber AI Learns on the Job 

Valentin Pourrinet, Cybersecurity Account Manager, Darktrace

  • The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.  As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever.
  • Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.   Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
  • Darktrace is the world leader in cyber AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments.  
  • In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating. 
14:50 - 15:10

► Why the Zero Trust security model is becoming a necessity?

Abdel Mokadem, Sales Engineering Manager France, Zscaler

  • Cloudification is accelerating
  • Work-from-Anywhere will become the new normal
  • Cyber threats are becoming more numerous and sophisticated
  • Protecting corporate data - wherever users, applications and devices are - becomes a strategic imperative​
15:10 - 15:40

► Education Seminars Session 3

Delegates will be able to choose from the following education seminars:

  • Time travel or how to beat alert fatigue with integrated data and our Open NDR Platform, Charles Rami, Senior Sales Engineering, Southern Europe, Corelight

  • Prevent vs Pay: A Better Ransomware Plan, Pauline Apretna, Country Lead, France, CybelAngel 

15:40 - 16:00

Networking break 

16:00 - 16:20

► Panel: Lessons From Lockdown

  • David Giorgis, RSSI France & Responsable des SI Industriels Eau, Suez
  • Frédéric Jésupret, Group Information Security Officer, Allianz Partners
  • Xavier Aghina, CISO, W-HA
  • Javier Gonzalez, Head of SOC, ENGIE
16:20 - 16:40

► Next Stop, Cybersecurity: a case study from the railway sector

Eddy Thésée, Cybersecurity Vice President, Alstom

  • Cybersecurity in railways: why is it so important, and what lessons can other sectors learn?
  • Remote working
  • New technologies and the Internet of Things
  • The importance of information sharing
  • Cyber risk management
16:40 - 17:00

► Brexit, Schrems II and the Future of Data Transfers

Gabriel Voisin, Partner, Privacy, Data Protection & Cyber, Bird & Bird LLP

  • Organisations have now transitioned into a post-Brexit landscape, a condition made even more complex by the rulings of Schrems II. 
  • What does this mean, in plain English, for companies transferring EU originated personal data?
  • Straight forward and applicable advice for businesses faced with a new state of play.  
17:00

Closing remarks

17:00 - 17:30

Networking break 

17:30

Conference Close

Education seminars


How does your security perform?


Valentin Lejop, Security Systems Engineer, Keysight Technologies 

In the sports world, coaches say you can only improve performance if you can measure it. And you can only address shortcomings if you can identify them. 

Could these principles also apply to security? In an ever-increasing threat landscape, do you know where your strengths and weaknesses lie?

With breach and attack simulation ( BAS) like Keysight’s Threat Simulator, you are able to monitor the security posture of your infrastructure in real time. How? By safely emulating malicious attacks in your production network. 

With Threat Simulator, you are able to: 

  • Validate your ability to remediate the latest threats
  • Measure your security against all types of threat (kill chain, command and control, malware, phishing, lateral movement, etc.)

Remediate vulnerabilities faster with recommendations integrated into your existing tools.


Why unconditional network access is a recipe for a digitalisation disaster


Nicolas Liard,​ Solutions Engineer, Bitglass & Valentin Jangwa Regional Sales Director, Southern Region, Bitglass

  • The latest attacks exploit trusted access to infiltrate the organization via VPNs, generic accounts, unprotected applications, BYOD, ...
  • Traditional access methodologies help attackers enter networks and move laterally within them
  • The Zero Trust and Sase approach is a better way to secure your organization.

The most effective way to get to highlight and address supply chain risk


Davide Turina Country Manager & Technical Director – France, Cybersel & Christophe Leautey - Regional Sales Director, BitSight 

Cybersel and Bitisght will provide you guidelines on supply chain risk monitoring after the Solarwinds breach. 

  • Impact and consequences of Solarwinds breach
  • Where are you in the TPRM maturity assessment program?
  • How you can get visibility on your supply chain cyber risk (3rd and 4th parties)
  • What are the best practices to monitor your supply chain in 2021

Cyber security threats to the digital transformation of businesses


Mr A Karthik, Chief Evangelist,  ManageEngine

Cybersecurity threats have become a common occurrence these days. With digital transformation taking over every

aspect of business, IT administrators are working 24/7 to keep attacks and hackers at bay. Round-the-clock monitoring

on all aspects of business security is needed to provide a safe and secure environment for both internal and external users.

  • Learn the top 10 Security threats in the world of digital transformation
  • Know how to mitigate them with easy to use on-premise and on-cloud solutions, 
  • Insights on Cloud gaining momentum these days in the period of lock down across the globe.​

Prevent vs Pay: A Better Ransomware Plan


Pauline Apretna, Country Lead, France, CybelAngel 

Ransomware attacks are multiplying, paralysing private companies and public organizations alike. As devastating as these attacks are, the root cause of this is often an unmonitored, vulnerable asset that opens the door to the target technological infrastructure.

A remote access, a login page to cloud services or even IoT devices: your employees and suppliers are leaving doors open that could represent 40% of your potential attack surface, and these entry points may be outside your radar.

Join us during during this speaking session to discover:

  • How ransomware gangs are scanning your external-facing assets for vulnerabilities.
  • How to secure your attack surface and integrate unmonitored, vulnerable assets.
  • How to prevent attacks by lowering the digital footprint of your organisation and suppliers. 

Detect & Investigate alerts faster with our OpenNDR platform


Charles Rami, Senior Sales Engineer, Corelight 

Cyber news shows us that it is important to be able to go back in time, sometime several months back, in order to understand what could have happened during an attack. When a breach occurred, it’s important to understand what happened and how, and moreover, what has been done. Designed to parse live traffic streams and log metadata across a wide variety of protocols, Corelight sensors produce all of the evidence a SOC needs to investigate security events in a standardized format that’s designed for ease of integration with detection technologies for rapid investigation. By adding Zeek UIDs directly to Suricata IDS events on its appliances, it enables analysts to see all of the metadata collected by Zeek and any other Suricata events generated on a stream in a single, simple query, directly out of the box, 100% of the time.

In this session, with some examples, Corelight will show you:

  • Why SOC teams are struggling to get the full picture ?
  • What is Zeek, how to use it and why it is very popular in the threat hunting world
  • How our Open NDR platform can enable immediate SOC improvements by combining Zeek and Suricata into the same platform