Tuesday, January 20

Technical
demonstrations
TV studio Challenges
11h00-11h30
D01 – Network intelligence servicing your security
Allot-Interdata
flag_fr
Summary
11h05-11h10
T01 – What have been the changes since the report published by Senator Jean-Marie Bockel on cybersecurity?
flag_fr
Summary
10h00-13h00
CA1 – Challenge FIC
EPITA
flag_fr
Summary
12h00-12h30
D02 – Technical demonstration Steria
flag_fr
Summary
11h35-11h50
T02 – Feedback on the ‘Onymous’ operation
flag_frflag_en
Summary
14h30-17h30
CA2 – Challenge FIC
ACISSI
flag_fr
résumé

13h00-13h30
D03 – 365view: a management console to document the safety of all software on the market
GB & Smith
flag_fr
Summary
12h10-12h15
T03 – Feedback on the Philippe Vitel report
flag_fr
Summary
14h00-14h30
D04 – Living the Life of a Black Hat
Intel Security
flag_fr
Summary
12h35-12h40
T04 – Deloitte
flag_fr
Summary
15h00-15h30
D05 – GravityZone Security for Virtual Environments
Bitdefender
flag_fr
Summary
13h05-13h10
T05 – Why has Huawei invested in cybersecurity?
flag_fr
Summary
16h00-16h30
D06 - Google attack us?
Suricat Concept
flag_fr
Summary
13h25-13h35
T06 – Orange Cyberdefense, a trusted partner in digital processing
flag_fr
Summary
13h50-14h00
T07 – Sopra-Steria-Group Cybersecurity : the role of global providers in gathering the players and and building the industry of trust
flag_fr
Summary
14h20-14h30
T08 – Innovation at the heart of cybersecurity Pradeo & CyberLab
flag_fr
Summary
14h50-15h00
T09 – Israel and its cybersecurity
flag_fr
Summary
15h20-15h30
T10 – What are the legal liabilities for an RSSI?
flag_fr
Summary
15h50-16h00
T11 – The 2014 Panorama on CLUSIF’s cybersecurity
flag_fr
Summary
16h25-16h35
T12 – EU Regulation and the protection of personal data: a difficult application?
flag_fr
Summary
17h00-17h15
T13 – Presentation of CeCyf
flag_fr
Summary
17h35-17h50
T14 – Impact of digital transformation on research and the training of cybersecurity and cyberdefense professionals
flag_fr
Summary