Agenda

Presentations already confirmed include:


The economic cyberwar

Federico Smith, Expert Consultant Cybercrime & Cybersecurity, Council of Europe

  • General surveillance and collateral damage
  • Hackers versus Crackers: the 10 typical techniques
  • Cyber peace: an imperative for businesses


Artificial Intelligence: the new frontier of threat intelligence

Xavier Creff, In charge of Threat Intelligence, Crédit Agricole

  • How can security teams cope with the evolving threat landscape without being overwhelmed by the volume of information they manage?
  • What are the effects of state-of-the-art technologies on cyber security?
  • How AI and threat intelligence can work together

The standards of cyber-risk

Paul Steiner, Head of Compliance, La Francaise des Jeux

  • Standards and benchmarking of cyber-risk
  • The relationship between cybersecurity and governance
  • Cyber-risk Management: how to protect the digital assets of your users

In a digitalising world, you can’t mention fraud without cybercrime

Yves Destrebecq, Fraud Prevention Manager, HSBC France

  • Main threats overview
  • The relationship between cybersecurity and the fight against fraud
  • Implementation of an efficient dispositive
  • When technology could block the main threats: fraud monitoring, machine learning, biometrics

Cybersecurity in Railways

Eddy Thesee, Information System Director, Alstom

  • Cybersecurity in railways: why is it so important?
  • The skills gap: Resourcing remains amongst the biggest challenges. How can cybersecurity leaders develop sufficient talent and resources to succeed in a digitalising world?
  • How to use, and adapt to, new technologies
  • The importance of information sharing
  • Cyber risk management

Can we risk a "low cost" option when it comes to GRC programs?

Cédric Baillet, CISO, Club Med

  • Taking cyber risk and compliance into account in comex and audit committees means setting up regular monitoring and associated reporting on these themes. The implementation of a governance program then becomes a necessity to guarantee action is structured, sustainable, and of high quality.
  • Is it possible to approach such a program with open source or "low cost" tools and what results can be expected?
  • A practical implementation on the themes of monitoring internal and third-party risks, incident logging and the implementation of controls:
    • Establishing parameters
    • Choosing a solution
    • Illustration of the approach implemented
    • Balance sheet in positive/negative form and next steps