Agenda a dl sur site - Les Rencontres de la Sécurité

Transcription

Agenda a dl sur site - Les Rencontres de la Sécurité
LES RENCONTRES DE LA SECURITE 2014
Room Workshop 1
8h-9h
9h-9h10
9h10-9h50
9h50-10h25
Room Workshop 2
Salle Plénière
Accueil-Coffee
Inauguration de la conférence- Salle Plénière
12h05-12h45
Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière
Workshop Cisco : The evolution of
Workshop UNOMALY : Countering
Atelier VARONIS : Stockage en
cybercrime, how to keep up with
the Black Box
ligne de vos données
Intelligent Cyber Security for the
Real World
Break- Pause Café
Atelier - Lancement du chapitre R2GS
Workshop by Systemat: Citrix
Luxembourg - Groupe de travail des SOC
Netscaler as Network and
et SIEM managers
Security consolidation platform
Workshop IBM : IBM Security
Workshop Checkpoint: Threat
F5 Networks: Aligning Business
Intelligence
Emulation
Strategy with the IT
infrastructure
Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière
12h45-13h45
Lunch et Networking au sein de l'espace Sponsors!!!
10h25-10h45
10h45-11h20
11h20-12h05
13h45-14h20
Workshop Cyberark: Step by Step to
Secure Privileged Accounts
14h25-15h00
Atelier KLEVERWARE : Comment s'intègre
la gestion des mobilités dans les
principes de recertification des accès
15h-15h20
15h20-15h55
15h55-16h30
16h30-17h00
Workshop Palo Alto networks :
Building Zero Trust
Architectures
Workshop Trend Micro: Securing
your virtual datacenter
Bluecoat: Security Analytics Analyze. Actualize.
A10 Networks : Next Generation
Datacenter - Enabling the
Hyper-Consolidation Solution
Break-Pause Café
Workshop Guidance: the Enemy Within –
Managing Insider Threats with Cyber
Forensic Protection
Workshop Juniper: Live Hack-a-ton with
#countersecurity
Workshop TRIPWIRE: Are you
investing in the right security
controls?
Workshop DELL : Connected
security
Workshop EC-Council: Latest News in
the Security Industry!
Workshop Circl - Excellium :
Déclarer un incident auprès des
Cert(s)
Workshop SKYBOX : Risk
Analytics - Using your data to
solve security challenges
Workshop Sophos: The Secure
Laptop: Using two-factor
authentication
Animation au sein des Sponsors et tirage au sort du concours
17h30-18h00
Clôture du premier Jour de conférence et Networking Drink
LES RENCONTRES DE LA SECURITE 2014
Room Workshop 2
Room Workshop 1
9h-9h10
9h10-10h10
10h10-10h45
10h45-11h20
2nd
Ouverture de la
journée de conférences- Salle Plénière
Sinistralité et bonnes pratiques de détection d'intrusions - Salle Plénière
Keynote Trend Micro: Building Resilient Networks
Through Threat Awareness!
Workshop Cyberark: Step by Step to Secure
Privileged Accounts
Workshop Checkpoint: TDDoS Protector: Multilayered protection against Denial of Service
attacks
Break - Pause café
Workshop UNOMALY : Countering the Black Box
11h20-11h50
11h50-12h30
12h30-13h00
13h00-13h30
13h30-14h05
14h05-14h40
14h40-15h10
15h10-15h45
15h45-16h20
16h20-17h05
19h00
Table Ronde APDL / CNPD / Excellium :
Keynote Orange : Retour et limite de mise en
Conséquences des intrusions informatique sur la
œuvre d’un service de supervision de la
vie privée
sécurité au sein d’Orange
Workshop Bluecoat: Security Analytics - Analyze.
Session Ec-Concil: Virtualization and Cloud
Actualize.
Security – Can it be true?
Lunch et Networking au sein de l'espace Sponsors!!!
Keynote Sophos: Anatomy of an Attack – How hackers
threaten your security
Workshop DELL : Connected security
Keynote IBM: Trusteer - Fraud prevention
Palo Alto Networks: Prevent APTs with the
solutions for customer protection and employee
Next-Generation Security Platform
protection
Break - Pause café
Keynote Cisco : The evolution of cybercrime, and Keynote Systemat - Seezam: Confidentialité et
how to keep up with Intelligent Cyber Security
Secret - Un MUST pour les Entreprises
for the Real World
Keynote Guidance : Security Intelligence through
Workshop F5 Networks: Aligning Business
endpoint forensic analytics
Strategy with the IT infrastructure
Keynote de Clôture par Nicolas Arpagian - Crime 2.0 : pourquoi le crime numérique paie - Salle
Plénière
Cloture de la Conference- Salle Plénière
BBQ avec concert Jazz - Salle Plénière

Documents pareils