www.it-and-cybersecurity-meetings.com Open in urlscan Pro
52.233.133.121  Public Scan

Submitted URL: https://www.it-and-cybersecurity-meetings.com/programmes
Effective URL: https://www.it-and-cybersecurity-meetings.com/en/conferences
Submission: On January 26 via api from FR — Scanned from IT

Form analysis 1 forms found in the DOM

POST https://salons.weyou-cms.com/itsm/wp-admin/admin-ajax.php

<form action="https://salons.weyou-cms.com/itsm/wp-admin/admin-ajax.php" method="post" class="type-filter">
  <span class="option-label">Filter</span>
  <select name="typefilter">
    <option value="-1">All conferences</option>
    <option value="workshop">Workshop</option>
  </select>
  <input type="hidden" name="action" value="weyou-conference-filter">
</form>

Text Content

Skip to content
 * 
 * 
 * 
 * 

 * Health rules
 * Exhibitor area
 * Press
 * EN
 * FR

MARCH 19th, 20th & 21st, 2024

Palais des Festivals et des Congrès de Cannes

 * Meeting
 * Exhibit
 * Visit
 * Conferences
 * Top Decision-makers
 * Partners
 * Infos
 * CSR/ESG
 * Contacts




CONFERENCES & WORKSHOPS PROGRAMME

PROGRAM Conferences and Workshops

PROGRAM

IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through
plenary conferences and “solutions” workshops led by experts in your sector of
activity.

VISIT


2024 CONFERENCES & WORKSHOPS

 * 20 March 2024
 * 21 March 2024
 * All

Filter All conferencesWorkshop
20 March 2024 09:00 to 09:45 Croisette Room Workshop


NIS 2: WHEN CYBER RISK ANALYSIS AND MANAGEMENT BECOME EUROPEAN OBLIGATIONS

Adopted at the end of 2022, the NIS2 directive is now in the hands of member
states, which have until October of this year to transpose it.
- What are the new obligations in terms of cyber risk analysis and management? 
- Who is affected? 
- What are the consequences of non-compliance? 
- How can technical constraints be transformed into business opportunities?
Let's take stock and anticipate this strategic and structuring issue for your
organizations at our EGERIE workshop.

Speaker:

Bruno GUILLOUX
Sales Director France – EGERIE

20 March 2024 14:30 to 15:15 Lérins Room Workshop


DECENTRALISED IDENTITY: GIVE USERS CONTROL OVER ACCESS (CIAM)

Organized by PING IDENTITY

Decentralised identity solutions give users back the power to manage their
personal data. They create a cornerstone of trust between the user, the issuers
of identity attributes and the certifiers who guarantee their authenticity.
Companies that are able to anticipate these changes and implement them have a
competitive advantage in terms of optimising their processes, controlling their
costs and streamlining their customer relations. Join this Ping Identity session
to learn more about decentralised identity in the context of CIAM.

Speaker:

Philippe DUBUC
Principal Solution Architect – PING IDENTITY


21 March 2024 09:00 to 09:45 Lérins Room Workshop


RETEX TRANSPORTS MAUFFREY : SIMPLY CONTROL AND AUDIT YOUR PRIVILEGED ACCESS WITH
THE PROVE IT ADMINISTRATION BASTION.

Damien Sibille, Head of the Networks and Security Department within the MAUFFREY
group, one of the leading French freight transport companies, will share his
experience regarding the role and importance of a PAM - Administration Bastion
for controlling and tracing access (privileged internal and external users) to
sensitive SI equipment.


He will explain why the MAUFFREY group chose the PROVE IT software solution from
Rubycat in March 2023.


Damien Sibille will return:


The context and IT & cybersecurity issues of transport MAUFFREY.The benefit of
setting up a bastion (population, type of information accessed, turnover,
etc.).The deployment, administration and maintenance of the PROVE IT solution.

Quentin Bernard, technical sales engineer at Rubycat, will give a detailed
presentation of the PROVE IT software solution.


A workshop not to be missed to discover a complete and concrete testimony, in
interaction with the editor Rubycat, for organizations wishing to secure their
infrastructure and effectively manage access and privileged accounts.


Speaker:

Damien SIBILLE
Manager of the networks and security division – TRANSPORT MAUFFREY

21 March 2024 09:00 to 09:45 Esterel Room Workshop


CYBERCRIME TRENDS 2024

Organized by SOSAFE

Cybercriminals are always innovating, instrumentalizing new technologies and
current events for their success. More than ever, staying ahead of the evolving
cyber threat landscape is key to keep up with cybercriminals, strengthening
resilience to security risks. Embark on a gripping journey into the heart of the
digital underworld with our talk: It will empower you to know about emerging
threats, identify early signs of an attack, and respond effectively.


Speaker:

Jérémy BOURGUET
Cybersecurity Awareness Expert – SOSAFE


21 March 2024 14:30 to 15:15 Esterel Room Workshop


DEVSECOPS: OBSERVABILITY FOR APPLICATION SECURITY

How can you optimize the vulnerability management of your applications
throughout their entire lifecycle? What is the key to meeting the growing demand
for rapid development while controlling security risks?  
During this workshop, you'll discover how we can go beyond Dynatrace's
traditional core business of observability to help you detect vulnerabilities in
real time, continuously, from the development phase right through to production.
And so protect your organization against growing attacks, while accelerating the
release cycle through better DevSecOps collaboration. 
Frédéric Farjon, in charge of the AppSec offering, will shed light on all these
issues, and explain how you can turn application vulnerability into a bug like
any other within your company.

21 March 2024 14:30 to 15:15 Croisette Room Workshop


TOWARDS A PASSWORDLESS FUTURE

Companies see a wide range of benefits in implementing passwordless
authentication - including improved security posture, consolidation of their
technology stack, reduced pressure on IT resources and improved user
experience. 
When it comes to authenticating your employees, the multiplicity of methods
makes for a complex technology stack. What if there was a simpler solution? One
that could consolidate your tools while doing away with a login method that
relies heavily on human behavior - passwords.

Find out more:
- Why companies are turning to passwordless authentication to secure their data;
- How and when they plan to implement passwordless technology within their
organization;
- The important role of passkeys in this passwordless future.

TRADE SHOW CONTACT :
+33 (0)1 41 18 60 63
contact@it-and-cybersecurity-meetings.com

 * 
 * 
 * 
 * 

CONTACTEZ NOTRE GROUPE:


Weyou Group
+33 (0)1 41 18 86 18
contact@weyou-group.com
8 rue de Saint-Cloud
92150 Suresnes

OUR BTOB EXHIBITIONS
 * Affaire de Cadeaux
 * All4Customer Paris
 * Educ@tech Expo
 * Europropre
 * Heavent Paris
 * Le Salon l’Environnement de Travail et des Achats
 * Seminaire Expo
 * Workspace Expo

OUR ONE TO ONE MEETINGS
 * CRM, Marketing, E-Commerce Meetings
 * Cleaning & Hygiene Meetings
 * E-Retail & E-Commerce Meetings
 * Governance Risk and Compliance Meetings
 * Healthcare Meetings
 * Heavent Meetings
 * Hotel & Restaurant Meetings
 * Interior Design Meetings
 * IT & Cybersecurity Meetings
 * Protection and Security Meetings
 * Transports & Logistics Meetings
 * Workplace Meetings

© 2024 Weyou Group. All rights reserved.
 * Site map
 * Legal Notice

 * Become Exhibitor
 * Become Top Decision-maker
 * 2024 EXHIBITORS’ LIST
 * FREE BADGE




Pannello di gestione dei cookies

Chiudi
Pannello di gestione dei cookies
Abilitando l'uso dei servizi di terze parti, accetti la ricezione dei cookies e
l'uso delle tecnologie analitici necessarie al loro funzionamento.
Preferenze per tutti i servizi
Consenti tutti i cookie Rifiuta tutti i cookie
 * Cookies obbligatori
   * Questo sito utilizza cookies necessari per il suo corretto funzionamento
     che non possono essere disattivati.
     
     Consenti Blocca
 * API
   Le API permettono di implementare script diversi : geolocalizzazione, motori
   di ricerca, traduttori...
   * Google jsapi
     non consentito - Questo servizio non invia nessun cookie
     Consenti Blocca
 * Altro
   Servizi per visualizzare contenuti web.
 * Commenti
   La gestione dei commenti utente aiuta a gestire la pubblicazione dei commenti
   e a lottare contro lo spamming
 * Misura del pubblico
   I servizi di misura del pubblico permettono di raccogliere le statistiche
   utili al miglioramento del sito
   * Google Analytics (GA4)
     non consentito - Questo servizio puo' inviare 11 cookies.
     Consenti Blocca
 * Regie pubblicitarie
   Le regie pubblicitarie producono redditi gestendo la commercializzazione
   degli spazi del sito dedicati alle campagne pubblicitarie
 * Reti sociali
   Le reti sociali permettono di migliorare l'aspetto conviviale del sito e di
   sviluppare la condivisione dei contenuti da parte degli utenti a fini
   promozionali.
 * Supporto
   I servizi di supporto ti consentono di contattare la team del sito e di
   contribuire al suo miglioramento
 * Video
   I servizi di condivisione di video permettono di arricchire il sito di
   contenuti multimediali e di aumentare la sua visibilità
   * Youtube (Js API)
     non consentito - Questo servizio non invia nessun cookie
     Consenti Blocca
 * Questo sito web non utilizza alcun cookie che richieda il tuo consenso.


Questo sito fa uso di cookies e ti consente di decidere se accettarli o
rifiutarli Ok, accetta tutto Rifiuta tutti i cookie Personalizza

Gestione dei servizi