Agenda

09.00 - 10.00

Breakfast Networking & Registration

10.00 - 10.10

Chair's Welcome

10.10 - 10.30

►Cybercrime: The State's Response 

Colonel David Flotat, Head of the Digital Proximity Division, National Cyber Unit

  • Overview of the evolving cyber threat landscape, including emerging risks and major incidents
  • Organisation of the State to combat cybercrime and developments in its response
  • Challenges and future prospects
10.30 - 10.50

►Enhancing threat detection and response with large-scale artificial intelligence

Nizar Ibrahim, Client Partner, Cyberproof 
Tomer Ohayon, Cyber Threat Intelligence Expert & Team Leader, Cyberproof 
Jonathan Ageorges, Cybersecurity Pre-sales, Cyberproof

  • How organisations can move from strategic Threat Intelligence to concrete and effective action within their SOC, thanks to a joint approach from CyberProof and Google
  • How to map exploit chains and threat actor profiles to improve prioritisation, monitoring, prevention and large-scale threat hunting - while leveraging AI to automate the integration of IoCs and significantly reduce false positives
  • Using a real-life scenario and tried-and-tested tools, we will illustrate how Google Threat Intelligence and Gemini, integrated with a SOAR, enable contextualised detection and response on a large scale
10.50 - 11.10

►Towards a Harmonised Integration of Automotive onboard Cybersecurity Activities in System Engineering

Pierpaolo Cincilla, Cybersecurity Expert Process & Compliance, Ampere (Group Renault) 
Pascal Chevalier, Cybersecurity Project Leader, Ampère Software Technology (Group Renault)

  • Early Cybersecurity Integration: How to incorporate cybersecurity principles from the start of the System Engineering process.
  • Utilising MBSE: Discover how to use Model-Based System Engineering for a unified approach to Cybersecurity and Safety. 
  • Agile Collaboration: Understand how the Agile development is helping to integrate cybersecurity in early phases of designs in a classical "V" development cycle.
     
11.10 - 11.40

Morning Networking Break

11.40 - 12.20

►Panel Discussion: Securing Future Architectures

Séverine Meunier, Director of Strategic Defence and Security Campaigns, Airbus Defence and Space (moderator) 
Valérie Doye, Information Systems Security Officer, ACMOSS 
Guillaume Contat, Head of Information Security and DPO, National Assembly 
Pierre Jaeger, Technical Director, IBM

  • How can security teams design resilient architectures to integrate and leverage emerging technologies such as AI, quantum computing, and IoT?
  • What role does AI play in developing proactive rather than reactive security strategies?
  • What are the best practices for integrating AI without disrupting legacy systems and existing workflows?
  • How can organisations implement zero-trust principles and adaptive access controls to secure ever-evolving environments driven by AI and edge computing?

 

12.20 - 13.00

►Education Seminars

Delegates will be able to choose from a range of topics:

  • Contextualise to React: ADR at the Service of Incident Response, Aurelién Svevi, Senior Solutions Engineer, Contrast Security
  • Built-In Security, Proven Results: Invicti in Your DevSecOps Pipeline, Veronica Chistol, Channel Account Manager, Invicti security
13.00 - 14.00

Lunch & Networking Break

14.00 - 14.20

►Quantum Computing: Opportunities, Risks & How to Get Ready

Pierre Jaeger, Technical Director, IBM

  • Understand what quantum computing means for your business
  • Explore real opportunities and potential risks
  • Learn tools and methods to start preparing now
  • Cut through the hype and see the real-world impact
14.20 - 14.40

►Mastering NIS2: Stay Compliant, but Be Secured

Thomas Degardin, CISO, Pernod Ricard

  • Understanding NIS2: Key topics and implications for organisations.
  • Compliance Strategies: Practical steps to align with the directive.
  • Risk & Resilience: Strengthening cybersecurity posture as a result of NIS2.
14.40 - 15.10

Afternoon Networking Break

15.10 - 15.40

►Panel Discussion: Navigating Cyber Regulations: Compliance, Innovation, and Future Trends

Annabelle Richard, Partner, Pinsent Masons (Moderator)
Thomas Degardin, CISO, Pernod Ricard 
Ezechiel Symenouh, Cyber Assurance, EU, Arch Insurance 
Séverine Meunier, Director of Strategic Defence and Security Campaigns, Airbus Defence and Space 
Caroline Klein, CISO, KLESIA

  • How is the evolving regulatory landscape, including GDPR and CNIL directives, shaping cybersecurity practices in France?
  • What compliance challenges do CISOs face when balancing robust security measures with regulatory requirements?
  • What best practices and innovative strategies are organisations adopting to comply with French cybersecurity regulations while mitigating emerging threats?
  • What future trends in French cyber regulations should organisations anticipate, and how can they proactively adapt to these changes?
  • How is the cyber insurance industry navigating this landscape and what are the key insurance considerations?
15.40 - 16.00

►The Future of Cyber Security Insurance: Navigating Risks in a Digital Age

Ezechiel Symenouh, Cyber Assurance, EU, Arch Insurance

  • How are AI, IoT, and new technologies reshaping cyber threats and increasing vulnerabilities for organisations in France.
  • Navigating European data protection laws and their influence on cyber insurance policies.
  • Integrating blockchain, quantum computing, and real-time monitoring to enhance incident response and organisational preparedness.
16.00

Chair's Closing Remarks

Education seminars


Contextualise to React: ADR at the Service of Incident Response


Aurelién Svevi, Senior Solutions Engineer, Contrast Security

In an ever-evolving threat landscape, simply detecting security incidents is no longer enough. Understanding the context is crucial to respond quickly and effectively. 

Attendees will learn:

  • How Application Detection and Response (ADR) enables threat contextualisation within your applications and provides the tools for proactive and targeted responses 
  • Discover how ADR helps you identify, analyse, and neutralise threats in real time, thereby protecting your applications and sensitive data
     

Built-In Security, Proven Results: Invicti in Your DevSecOps Pipeline


Veronica Chistol, Channel Account Manager, Invicti Security

Join this session to discover how Invicti enables organisations to integrate security at every stage of the software development lifecycle—without compromising speed or innovation. Learn how Invicti helps development and security teams work together by automating vulnerability scanning with accurate, actionable results.

Attendees will learn:

  • How to integrate Invicti into CI/CD pipelines for continuous security testing
  • The benefits of DAST (Dynamic Application Security Testing) for identifying vulnerabilities in real-world environments
  • How IAST (Interactive Application Security Testing) enhances visibility into vulnerable code during dynamic testing
  • How Proof-Based Scanning confirms exploitable vulnerabilities automatically, eliminating false positives
  • Best practices for prioritising and remediating issues without slowing development cycles
  • How Invicti supports compliance and reduces risk across all web applications