Upload
raphael-henry
View
554
Download
0
Embed Size (px)
Citation preview
L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4
Room Workshop 1 Room Workshop 2 Salle Plénière 8h-9h Accueil-Coffee
9h-9h10 Inauguration de la conférence- Salle Plénière 9h10-9h50 Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière 9h50-10h25 Workshop Cisco : The evolution of
cybercrime, how to keep up with Intelligent Cyber Security for the
Real World
Workshop UNOMALY : Countering the Black Box
Atelier VARONIS : Stockage en ligne de vos données
10h25-10h45 Break- Pause Café 10h45-11h20 Atelier - Lancement du chapitre R2GS
Luxembourg - Groupe de travail des SOC et SIEM managers
Workshop by Systemat: Citrix Netscaler as Network and
Security consolidation platform
11h20-12h05 Workshop IBM : IBM Security Intelligence
Workshop Checkpoint: Threat Emulation
F5 Networks: Aligning Business Strategy with the IT
infrastructure 12h05-12h45 Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière
12h45-13h45 Lunch et Networking au sein de l'espace Sponsors!!!
13h45-14h20 Workshop Cyberark: Step by Step to Secure Privileged Accounts
Workshop Palo Alto networks : Building Zero Trust
Architectures
Bluecoat: Security Analytics - Analyze. Actualize.
14h25-15h00 Atelier KLEVERWARE : Comment s'intègre la gestion des mobilités dans les
principes de recertification des accès
Workshop Trend Micro: Securing your virtual datacenter
A10 Networks : Next Generation Datacenter - Enabling the
Hyper-Consolidation Solution 15h-15h20 Break-Pause Café
15h20-15h55 Workshop Guidance: the Enemy Within – Managing Insider Threats with Cyber
Forensic Protection
Workshop TRIPWIRE: Are you investing in the right security
controls?
Workshop SKYBOX : Risk Analytics - Using your data to
solve security challenges 15h55-16h30 Workshop Juniper: Live Hack-a-ton with
#countersecurity Workshop DELL : Connected
security Workshop Sophos: The Secure Laptop: Using two-factor
authentication 16h30-17h00 Workshop EC-Council: Latest News in
the Security Industry! Workshop Circl - Excellium :
Déclarer un incident auprès des Cert(s)
Animation au sein des Sponsors et tirage au sort du concours
17h30-18h00 Clôture du premier Jour de conférence et Networking Drink
L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4
Room Workshop 1
Room Workshop 2 9h-9h10 Ouverture de la 2nd journée de conférences- Salle Plénière
9h10-10h10 Sinistralité et bonnes pratiques de détection d'intrusions - Salle Plénière
10h10-10h45 Keynote Trend Micro: Building Resilient Networks Through Threat Awareness!
Workshop Cyberark: Step by Step to Secure Privileged Accounts
10h45-11h20
Workshop UNOMALY : Countering the Black Box Workshop Checkpoint: TDDoS Protector: Multi-layered protection against Denial of Service
attacks 11h20-11h50 Break - Pause café
11h50-12h30 Table Ronde APDL / CNPD / Excellium : Conséquences des intrusions informatique sur la
vie privée
Keynote Orange : Retour et limite de mise en œuvre d’un service de supervision de la
sécurité au sein d’Orange 12h30-13h00 Workshop Bluecoat: Security Analytics - Analyze.
Actualize. Session Ec-Concil: Virtualization and Cloud
Security – Can it be true? 13h00-13h30 Lunch et Networking au sein de l'espace Sponsors!!! 13h30-14h05 Keynote Sophos: Anatomy of an Attack – How hackers
threaten your security
Workshop DELL : Connected security
14h05-14h40 Keynote IBM: Trusteer - Fraud prevention solutions for customer protection and employee
protection
Palo Alto Networks: Prevent APTs with the Next-Generation Security Platform
14h40-15h10 Break - Pause café
15h10-15h45 Keynote Cisco : The evolution of cybercrime, and how to keep up with Intelligent Cyber Security
for the Real World
Keynote Systemat - Seezam: Confidentialité et Secret - Un MUST pour les Entreprises
15h45-16h20 Keynote Guidance : Security Intelligence through endpoint forensic analytics
Workshop F5 Networks: Aligning Business Strategy with the IT infrastructure
16h20-17h05 Keynote de Clôture par Nicolas Arpagian - Crime 2.0 : pourquoi le crime numérique paie - Salle Plénière
Cloture de la Conference- Salle Plénière 19h00 BBQ avec concert Jazz - Salle Plénière