www.it-and-cybersecurity-meetings.com
Open in
urlscan Pro
52.233.133.121
Public Scan
Submitted URL: https://www.it-and-cybersecurity-meetings.com/programmes
Effective URL: https://www.it-and-cybersecurity-meetings.com/en/conferences
Submission: On January 26 via api from FR — Scanned from IT
Effective URL: https://www.it-and-cybersecurity-meetings.com/en/conferences
Submission: On January 26 via api from FR — Scanned from IT
Form analysis
1 forms found in the DOMPOST https://salons.weyou-cms.com/itsm/wp-admin/admin-ajax.php
<form action="https://salons.weyou-cms.com/itsm/wp-admin/admin-ajax.php" method="post" class="type-filter">
<span class="option-label">Filter</span>
<select name="typefilter">
<option value="-1">All conferences</option>
<option value="workshop">Workshop</option>
</select>
<input type="hidden" name="action" value="weyou-conference-filter">
</form>
Text Content
Skip to content * * * * * Health rules * Exhibitor area * Press * EN * FR MARCH 19th, 20th & 21st, 2024 Palais des Festivals et des Congrès de Cannes * Meeting * Exhibit * Visit * Conferences * Top Decision-makers * Partners * Infos * CSR/ESG * Contacts CONFERENCES & WORKSHOPS PROGRAMME PROGRAM Conferences and Workshops PROGRAM IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity. VISIT 2024 CONFERENCES & WORKSHOPS * 20 March 2024 * 21 March 2024 * All Filter All conferencesWorkshop 20 March 2024 09:00 to 09:45 Croisette Room Workshop NIS 2: WHEN CYBER RISK ANALYSIS AND MANAGEMENT BECOME EUROPEAN OBLIGATIONS Adopted at the end of 2022, the NIS2 directive is now in the hands of member states, which have until October of this year to transpose it. - What are the new obligations in terms of cyber risk analysis and management? - Who is affected? - What are the consequences of non-compliance? - How can technical constraints be transformed into business opportunities? Let's take stock and anticipate this strategic and structuring issue for your organizations at our EGERIE workshop. Speaker: Bruno GUILLOUX Sales Director France – EGERIE 20 March 2024 14:30 to 15:15 Lérins Room Workshop DECENTRALISED IDENTITY: GIVE USERS CONTROL OVER ACCESS (CIAM) Organized by PING IDENTITY Decentralised identity solutions give users back the power to manage their personal data. They create a cornerstone of trust between the user, the issuers of identity attributes and the certifiers who guarantee their authenticity. Companies that are able to anticipate these changes and implement them have a competitive advantage in terms of optimising their processes, controlling their costs and streamlining their customer relations. Join this Ping Identity session to learn more about decentralised identity in the context of CIAM. Speaker: Philippe DUBUC Principal Solution Architect – PING IDENTITY 21 March 2024 09:00 to 09:45 Lérins Room Workshop RETEX TRANSPORTS MAUFFREY : SIMPLY CONTROL AND AUDIT YOUR PRIVILEGED ACCESS WITH THE PROVE IT ADMINISTRATION BASTION. Damien Sibille, Head of the Networks and Security Department within the MAUFFREY group, one of the leading French freight transport companies, will share his experience regarding the role and importance of a PAM - Administration Bastion for controlling and tracing access (privileged internal and external users) to sensitive SI equipment. He will explain why the MAUFFREY group chose the PROVE IT software solution from Rubycat in March 2023. Damien Sibille will return: The context and IT & cybersecurity issues of transport MAUFFREY.The benefit of setting up a bastion (population, type of information accessed, turnover, etc.).The deployment, administration and maintenance of the PROVE IT solution. Quentin Bernard, technical sales engineer at Rubycat, will give a detailed presentation of the PROVE IT software solution. A workshop not to be missed to discover a complete and concrete testimony, in interaction with the editor Rubycat, for organizations wishing to secure their infrastructure and effectively manage access and privileged accounts. Speaker: Damien SIBILLE Manager of the networks and security division – TRANSPORT MAUFFREY 21 March 2024 09:00 to 09:45 Esterel Room Workshop CYBERCRIME TRENDS 2024 Organized by SOSAFE Cybercriminals are always innovating, instrumentalizing new technologies and current events for their success. More than ever, staying ahead of the evolving cyber threat landscape is key to keep up with cybercriminals, strengthening resilience to security risks. Embark on a gripping journey into the heart of the digital underworld with our talk: It will empower you to know about emerging threats, identify early signs of an attack, and respond effectively. Speaker: Jérémy BOURGUET Cybersecurity Awareness Expert – SOSAFE 21 March 2024 14:30 to 15:15 Esterel Room Workshop DEVSECOPS: OBSERVABILITY FOR APPLICATION SECURITY How can you optimize the vulnerability management of your applications throughout their entire lifecycle? What is the key to meeting the growing demand for rapid development while controlling security risks? During this workshop, you'll discover how we can go beyond Dynatrace's traditional core business of observability to help you detect vulnerabilities in real time, continuously, from the development phase right through to production. And so protect your organization against growing attacks, while accelerating the release cycle through better DevSecOps collaboration. Frédéric Farjon, in charge of the AppSec offering, will shed light on all these issues, and explain how you can turn application vulnerability into a bug like any other within your company. 21 March 2024 14:30 to 15:15 Croisette Room Workshop TOWARDS A PASSWORDLESS FUTURE Companies see a wide range of benefits in implementing passwordless authentication - including improved security posture, consolidation of their technology stack, reduced pressure on IT resources and improved user experience. When it comes to authenticating your employees, the multiplicity of methods makes for a complex technology stack. What if there was a simpler solution? One that could consolidate your tools while doing away with a login method that relies heavily on human behavior - passwords. Find out more: - Why companies are turning to passwordless authentication to secure their data; - How and when they plan to implement passwordless technology within their organization; - The important role of passkeys in this passwordless future. TRADE SHOW CONTACT : +33 (0)1 41 18 60 63 contact@it-and-cybersecurity-meetings.com * * * * CONTACTEZ NOTRE GROUPE: Weyou Group +33 (0)1 41 18 86 18 contact@weyou-group.com 8 rue de Saint-Cloud 92150 Suresnes OUR BTOB EXHIBITIONS * Affaire de Cadeaux * All4Customer Paris * Educ@tech Expo * Europropre * Heavent Paris * Le Salon l’Environnement de Travail et des Achats * Seminaire Expo * Workspace Expo OUR ONE TO ONE MEETINGS * CRM, Marketing, E-Commerce Meetings * Cleaning & Hygiene Meetings * E-Retail & E-Commerce Meetings * Governance Risk and Compliance Meetings * Healthcare Meetings * Heavent Meetings * Hotel & Restaurant Meetings * Interior Design Meetings * IT & Cybersecurity Meetings * Protection and Security Meetings * Transports & Logistics Meetings * Workplace Meetings © 2024 Weyou Group. All rights reserved. * Site map * Legal Notice * Become Exhibitor * Become Top Decision-maker * 2024 EXHIBITORS’ LIST * FREE BADGE Pannello di gestione dei cookies Chiudi Pannello di gestione dei cookies Abilitando l'uso dei servizi di terze parti, accetti la ricezione dei cookies e l'uso delle tecnologie analitici necessarie al loro funzionamento. Preferenze per tutti i servizi Consenti tutti i cookie Rifiuta tutti i cookie * Cookies obbligatori * Questo sito utilizza cookies necessari per il suo corretto funzionamento che non possono essere disattivati. Consenti Blocca * API Le API permettono di implementare script diversi : geolocalizzazione, motori di ricerca, traduttori... * Google jsapi non consentito - Questo servizio non invia nessun cookie Consenti Blocca * Altro Servizi per visualizzare contenuti web. * Commenti La gestione dei commenti utente aiuta a gestire la pubblicazione dei commenti e a lottare contro lo spamming * Misura del pubblico I servizi di misura del pubblico permettono di raccogliere le statistiche utili al miglioramento del sito * Google Analytics (GA4) non consentito - Questo servizio puo' inviare 11 cookies. Consenti Blocca * Regie pubblicitarie Le regie pubblicitarie producono redditi gestendo la commercializzazione degli spazi del sito dedicati alle campagne pubblicitarie * Reti sociali Le reti sociali permettono di migliorare l'aspetto conviviale del sito e di sviluppare la condivisione dei contenuti da parte degli utenti a fini promozionali. * Supporto I servizi di supporto ti consentono di contattare la team del sito e di contribuire al suo miglioramento * Video I servizi di condivisione di video permettono di arricchire il sito di contenuti multimediali e di aumentare la sua visibilità * Youtube (Js API) non consentito - Questo servizio non invia nessun cookie Consenti Blocca * Questo sito web non utilizza alcun cookie che richieda il tuo consenso. Questo sito fa uso di cookies e ti consente di decidere se accettarli o rifiutarli Ok, accetta tutto Rifiuta tutti i cookie Personalizza Gestione dei servizi