Agenda a dl sur site - Les Rencontres de la Sécurité
Transcription
Agenda a dl sur site - Les Rencontres de la Sécurité
LES RENCONTRES DE LA SECURITE 2014 Room Workshop 1 8h-9h 9h-9h10 9h10-9h50 9h50-10h25 Room Workshop 2 Salle Plénière Accueil-Coffee Inauguration de la conférence- Salle Plénière 12h05-12h45 Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière Workshop Cisco : The evolution of Workshop UNOMALY : Countering Atelier VARONIS : Stockage en cybercrime, how to keep up with the Black Box ligne de vos données Intelligent Cyber Security for the Real World Break- Pause Café Atelier - Lancement du chapitre R2GS Workshop by Systemat: Citrix Luxembourg - Groupe de travail des SOC Netscaler as Network and et SIEM managers Security consolidation platform Workshop IBM : IBM Security Workshop Checkpoint: Threat F5 Networks: Aligning Business Intelligence Emulation Strategy with the IT infrastructure Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière 12h45-13h45 Lunch et Networking au sein de l'espace Sponsors!!! 10h25-10h45 10h45-11h20 11h20-12h05 13h45-14h20 Workshop Cyberark: Step by Step to Secure Privileged Accounts 14h25-15h00 Atelier KLEVERWARE : Comment s'intègre la gestion des mobilités dans les principes de recertification des accès 15h-15h20 15h20-15h55 15h55-16h30 16h30-17h00 Workshop Palo Alto networks : Building Zero Trust Architectures Workshop Trend Micro: Securing your virtual datacenter Bluecoat: Security Analytics Analyze. Actualize. A10 Networks : Next Generation Datacenter - Enabling the Hyper-Consolidation Solution Break-Pause Café Workshop Guidance: the Enemy Within – Managing Insider Threats with Cyber Forensic Protection Workshop Juniper: Live Hack-a-ton with #countersecurity Workshop TRIPWIRE: Are you investing in the right security controls? Workshop DELL : Connected security Workshop EC-Council: Latest News in the Security Industry! Workshop Circl - Excellium : Déclarer un incident auprès des Cert(s) Workshop SKYBOX : Risk Analytics - Using your data to solve security challenges Workshop Sophos: The Secure Laptop: Using two-factor authentication Animation au sein des Sponsors et tirage au sort du concours 17h30-18h00 Clôture du premier Jour de conférence et Networking Drink LES RENCONTRES DE LA SECURITE 2014 Room Workshop 2 Room Workshop 1 9h-9h10 9h10-10h10 10h10-10h45 10h45-11h20 2nd Ouverture de la journée de conférences- Salle Plénière Sinistralité et bonnes pratiques de détection d'intrusions - Salle Plénière Keynote Trend Micro: Building Resilient Networks Through Threat Awareness! Workshop Cyberark: Step by Step to Secure Privileged Accounts Workshop Checkpoint: TDDoS Protector: Multilayered protection against Denial of Service attacks Break - Pause café Workshop UNOMALY : Countering the Black Box 11h20-11h50 11h50-12h30 12h30-13h00 13h00-13h30 13h30-14h05 14h05-14h40 14h40-15h10 15h10-15h45 15h45-16h20 16h20-17h05 19h00 Table Ronde APDL / CNPD / Excellium : Keynote Orange : Retour et limite de mise en Conséquences des intrusions informatique sur la œuvre d’un service de supervision de la vie privée sécurité au sein d’Orange Workshop Bluecoat: Security Analytics - Analyze. Session Ec-Concil: Virtualization and Cloud Actualize. Security – Can it be true? Lunch et Networking au sein de l'espace Sponsors!!! Keynote Sophos: Anatomy of an Attack – How hackers threaten your security Workshop DELL : Connected security Keynote IBM: Trusteer - Fraud prevention Palo Alto Networks: Prevent APTs with the solutions for customer protection and employee Next-Generation Security Platform protection Break - Pause café Keynote Cisco : The evolution of cybercrime, and Keynote Systemat - Seezam: Confidentialité et how to keep up with Intelligent Cyber Security Secret - Un MUST pour les Entreprises for the Real World Keynote Guidance : Security Intelligence through Workshop F5 Networks: Aligning Business endpoint forensic analytics Strategy with the IT infrastructure Keynote de Clôture par Nicolas Arpagian - Crime 2.0 : pourquoi le crime numérique paie - Salle Plénière Cloture de la Conference- Salle Plénière BBQ avec concert Jazz - Salle Plénière