Contenu des interventions 2018

A01

Cloud computing : what will change with GDPR

A02

How International Cooperation can deal with Ransomware

A03

How to link SOCS and Crisis Management

A04

Agora Parlementaire

A05

Business Continuity Plans (BCPs) and Business Recovery Plans (BRPs) put to the test

A06

How do we harmonize our certification outlines to reconcile different requirement levels

A07

Cyber Threats Intelligence : what is its real added value ?

A08

Security by design, a new commercial and industrial imperative

A09

Should hack back be authorized for private corporations

A10

Cyber-Jihadism : public/private cooperation put to the test

A11

KYC and cyber security should clients, partners and providers now be assessed

A12

CTI how far can we go back up the «cyber kill chain»

A13

Wanacry and NotPetya feedback

A14

Darknets and Darknauts

A15

GDPR : Instructions for Compliance

A16

How to outsource your SOC

A17

Which dashboards to address your executive committee

A18

Capacity building international cooperation put to the test

A19

The NIS and critical infrastructure : how to ensure compliance

A20

Are connected objects the « Weakest Links » of cyber resilience ?

A21

The possibility of safe and secure smart cities

A22

Should we fear the balkanization of the internet

A23

WHICH INNOVATIVE APPROACHES FOR A ROBUST SOC-BASED CYBERDEFENSE

A24

Digital Life : Local Authorities on the front line

A25

TRAINING AND PRACTICE: HOW TO DEVELOP AND MAINTAIN KNOW-HOW AND INTERPERSONAL SKILLS

A26

Using Agile Security with Red Teaming and Bug Bounty

A27

DevOps : Can we reconcile security and speed ?

A28

CTI : how do we make it operational ?

A29

Digital Identity : how do we share roles ?

A30

PhilosoFIC : Predictive Algorithms

C06

ENGIE INEO: RETEX OF INDUSTRIAL IS AUDITS ON THE 3S MODEL: SENSITIZING, SECURING, SUPERVISING

C14

Microsoft: Cloud et chiffrement, amis ou ennemis ?

C17

AMAZON WEB SERVICES : CLOUD SECURITY AT AWS IS THE HIGHEST PRIORITY. LEARN HOW TO PROTECT YOUR DATA WITH CLOUD-POWERED SECURITY

MC07

RATIONALITY, NUDGES & CYBERSECURITY

MC08

DETECTION IS DEAD

MC12

THE UNTOLD STORY ABOUT THREAT INTELLIGENCE: HOW MISP BECAME A SIGNIFICANT OPEN SOURCE THREAT INTELLIGENCE PLATFORM AND OPEN STANDARDS FOR INFORMATION SHARING