2
LES RENCONTRES DE LA SECURITE 2014 Room Workshop 1 Room Workshop 2 Salle Plénière 8h-9h Accueil-Coffee 9h-9h10 Inauguration de la conférence- Salle Plénière 9h10-9h50 Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière 9h50-10h25 Workshop Cisco : The evolution of cybercrime, how to keep up with Intelligent Cyber Security for the Real World Workshop UNOMALY : Countering the Black Box Atelier VARONIS : Stockage en ligne de vos données 10h25-10h45 Break- Pause Café 10h45-11h20 Atelier - Lancement du chapitre R2GS Luxembourg - Groupe de travail des SOC et SIEM managers Workshop by Systemat: Citrix Netscaler as Network and Security consolidation platform 11h20-12h05 Workshop IBM : IBM Security Intelligence Workshop Checkpoint: Threat Emulation F5 Networks: Aligning Business Strategy with the IT infrastructure 12h05-12h45 Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière 12h45-13h45 Lunch et Networking au sein de l'espace Sponsors!!! 13h45-14h20 Workshop Cyberark: Step by Step to Secure Privileged Accounts Workshop Palo Alto networks : Building Zero Trust Architectures Bluecoat: Security Analytics - Analyze. Actualize. 14h25-15h00 Atelier KLEVERWARE : Comment s'intègre la gestion des mobilités dans les principes de recertification des accès Workshop Trend Micro: Securing your virtual datacenter A10 Networks : Next Generation Datacenter - Enabling the Hyper-Consolidation Solution 15h-15h20 Break-Pause Café 15h20-15h55 Workshop Guidance: the Enemy Within – Managing Insider Threats with Cyber Forensic Protection Workshop TRIPWIRE: Are you investing in the right security controls? Workshop SKYBOX : Risk Analytics - Using your data to solve security challenges 15h55-16h30 Workshop Juniper: Live Hack-a-ton with #countersecurity Workshop DELL : Connected security Workshop Sophos: The Secure Laptop: Using two-factor authentication 16h30-17h00 Workshop EC-Council: Latest News in the Security Industry! Workshop Circl - Excellium : Déclarer un incident auprès des Cert(s) Animation au sein des Sponsors et tirage au sort du concours 17h30-18h00 Clôture du premier Jour de conférence et Networking Drink

agenda-2014

Embed Size (px)

Citation preview

Page 1: agenda-2014

L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4

Room Workshop 1 Room Workshop 2 Salle Plénière 8h-9h Accueil-Coffee

9h-9h10 Inauguration de la conférence- Salle Plénière 9h10-9h50 Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière 9h50-10h25 Workshop Cisco : The evolution of

cybercrime, how to keep up with Intelligent Cyber Security for the

Real World

Workshop UNOMALY : Countering the Black Box

Atelier VARONIS : Stockage en ligne de vos données

10h25-10h45 Break- Pause Café 10h45-11h20 Atelier - Lancement du chapitre R2GS

Luxembourg - Groupe de travail des SOC et SIEM managers

Workshop by Systemat: Citrix Netscaler as Network and

Security consolidation platform

11h20-12h05 Workshop IBM : IBM Security Intelligence

Workshop Checkpoint: Threat Emulation

F5 Networks: Aligning Business Strategy with the IT

infrastructure 12h05-12h45 Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière

12h45-13h45 Lunch et Networking au sein de l'espace Sponsors!!!

13h45-14h20 Workshop Cyberark: Step by Step to Secure Privileged Accounts

Workshop Palo Alto networks : Building Zero Trust

Architectures

Bluecoat: Security Analytics - Analyze. Actualize.

14h25-15h00 Atelier KLEVERWARE : Comment s'intègre la gestion des mobilités dans les

principes de recertification des accès

Workshop Trend Micro: Securing your virtual datacenter

A10 Networks : Next Generation Datacenter - Enabling the

Hyper-Consolidation Solution 15h-15h20 Break-Pause Café

15h20-15h55 Workshop Guidance: the Enemy Within – Managing Insider Threats with Cyber

Forensic Protection

Workshop TRIPWIRE: Are you investing in the right security

controls?

Workshop SKYBOX : Risk Analytics - Using your data to

solve security challenges 15h55-16h30 Workshop Juniper: Live Hack-a-ton with

#countersecurity Workshop DELL : Connected

security Workshop Sophos: The Secure Laptop: Using two-factor

authentication 16h30-17h00 Workshop EC-Council: Latest News in

the Security Industry! Workshop Circl - Excellium :

Déclarer un incident auprès des Cert(s)

Animation au sein des Sponsors et tirage au sort du concours

17h30-18h00 Clôture du premier Jour de conférence et Networking Drink

Page 2: agenda-2014

L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4

Room Workshop 1

Room Workshop 2 9h-9h10 Ouverture de la 2nd journée de conférences- Salle Plénière

9h10-10h10 Sinistralité et bonnes pratiques de détection d'intrusions - Salle Plénière

10h10-10h45 Keynote Trend Micro: Building Resilient Networks Through Threat Awareness!

Workshop Cyberark: Step by Step to Secure Privileged Accounts

10h45-11h20

Workshop UNOMALY : Countering the Black Box Workshop Checkpoint: TDDoS Protector: Multi-layered protection against Denial of Service

attacks 11h20-11h50 Break - Pause café

11h50-12h30 Table Ronde APDL / CNPD / Excellium : Conséquences des intrusions informatique sur la

vie privée

Keynote Orange : Retour et limite de mise en œuvre d’un service de supervision de la

sécurité au sein d’Orange 12h30-13h00 Workshop Bluecoat: Security Analytics - Analyze.

Actualize. Session Ec-Concil: Virtualization and Cloud

Security – Can it be true? 13h00-13h30 Lunch et Networking au sein de l'espace Sponsors!!! 13h30-14h05 Keynote Sophos: Anatomy of an Attack – How hackers

threaten your security

Workshop DELL : Connected security

14h05-14h40 Keynote IBM: Trusteer - Fraud prevention solutions for customer protection and employee

protection

Palo Alto Networks: Prevent APTs with the Next-Generation Security Platform

14h40-15h10 Break - Pause café

15h10-15h45 Keynote Cisco : The evolution of cybercrime, and how to keep up with Intelligent Cyber Security

for the Real World

Keynote Systemat - Seezam: Confidentialité et Secret - Un MUST pour les Entreprises

15h45-16h20 Keynote Guidance : Security Intelligence through endpoint forensic analytics

Workshop F5 Networks: Aligning Business Strategy with the IT infrastructure

16h20-17h05 Keynote de Clôture par Nicolas Arpagian - Crime 2.0 : pourquoi le crime numérique paie - Salle Plénière

Cloture de la Conference- Salle Plénière 19h00 BBQ avec concert Jazz - Salle Plénière