You will find below, the program of the conferences which will be regularly updated.
Here below, you can find the program of the conferences that will be regularly updated.
8:00 - 9:00 am
Come have a coffee with us !
9:00 - 9:30 am
Antoine Camus - Minalogic
Julien Dreano - Group Ciso Framatome
Corporate networks are interconnected, IT and OT are converging, and the extended enterprise is becoming a reality. The cybersecurity of the ecosystem, i.e. the industrial company and its network of suppliers and partners, is becoming a crucial issue.
Safety must be seen as the source of everything, not just as a brake and an investment, but also as a competitive advantage.
To protect yourself properly, you need to identify the main attack vectors and attacker profiles. We'll also give you the 10 essential rules for protecting your business, as well as the technical and financial means to help you implement them.
9:30 - 10:00 am
Pablo Ramirez Garcia - Framatome
In the complex and fast-changing world of cybersecurity, CISOs and industrial CISOs are called upon more than ever. They are navigating a sea of information, juggling asset management, vulnerability identification, threat neutralization and remediation strategy implementation, all in the context of constantly improving their cybersecurity posture and rigorously optimizing resources.
In this context, we will present the determining factors and potential solutions to help cybersecurity managers in industrial environments address the complex subject of CSM.
10:30 - 11:00 am
Hervé Bodinier - Excelsior Safety
How to manage production big DATA safely :
From managing IoT and IoT security and cybersecurity, to exporting big DATA to an external environment (cloud) accessible to data scientists.
11:00 - 11:30 am
Networking room
11:30 - 12:00 am
Gilles Loridon - Allentis
This conference will provide industry feedback on the application of the IEC/ISA 62443 industrial cybersecurity standard, with a focus on requirements and security levels for IoT systems (paragraph 3-3).
It will show auditors the security control requirements, and how they depend on the targeted security level of the information system under consideration.
For example, a secure injection system may have a higher level of security than a Historian system, given their impact on the network.
After explaining the concepts of Zone/Commodity, cardinal security level, SL, this conference will illustrate the whole process with the fundamental requirement n°5, FR5, which concerns sensitive and critical flows.
The second part of the conference will highlight the lessons we have learned from our experiences in the field, in particular during the implementation of the FR5 requirement on restricted data flows, with a focus on SL-Target, SL-Capability and SL-Achieved through two real-life industrial examples.
12:00 - 12:30 pm
Roxana Magdo - Keysight
When it comes to safety, there are many critical factors to consider. We all understand that security is more than just prevention, because nothing can be guaranteed to be 100 %. It also encompasses our response to breaches, the recovery procedures we put in place, and the investigative methods we use. Throughout this security cycle, many challenges may arise. We'll take a look at some of these challenges and how to overcome them.
12:30 - 1:00 pm
Hichame Ben Hassine - AlgoSecure
In a complex environment where IT and OT converge, how can you identify your most critical assets, manage vulnerabilities and anticipate potential ransomware threats?
1:00 - 2:00 pm
Networking room
2:00 - 2:30 pm
Yaëlle Guillemot - Conscio Technologies
From the 8th most affected sector by cyberattacks in 2019, to the 2nd in 2021, industry has become a priority target for cybercriminals. The security of industrial systems has become a real challenge.
Thanks to our sector-specific approach to industry, we offer tailored content, co-constructed with industry CIOs and production engineers. Avoid the existing risks and threats of cyber-attacks, and discover how it's within everyone's reach to counter cybercriminals by adopting the right behaviors.
2:30 - 3:00 pm
Stéphane Rabette - Secureworks® & Sacha Hilic - IMS Networks
23% of cyber attacks affect industrial organizations, according to Gartner.
The risk has increased in recent years with the need to control industrial processes from an IT environment, without sufficient investment in cyber security.
A Pandora's box has opened for attackers, with the opportunity to target a vulnerable environment due to an architecture and equipment that underestimates the crucial role of cybersecurity.
The tools to identify cyber threats in environments are there, but the real advantage lies in integrating them into a 'converged' SOC (Security Operations Center) that can detect and react to threats in both IT and OT systems.
7 out of 10 industrial companies will adopt this convergence model by the end of 2025, according to Gartner. We'll see if this prediction is true during this session!
3:00 - 3:30 pm
Inès Boutar - SoSafe
Cybercriminals are renowned for their remarkable technical skills, but did you know they're also capable of hacking into our brains?
Not only are they experts in computer systems, they also know perfectly well how the human mind works, and exploit ever more sophisticated methods of manipulation, from phishing to identity theft...
They use current events, such as global pandemics or economic crises, to convince us to make hasty, impulsive decisions. They have professionalized their methods, exploring new channels to approach their victims, and don't hesitate to use artificial intelligence to design more complex mass attacks.
Inès Boutar reveals the most effective tactics used by cybercriminals, and offers recommendations and best practices to protect us from them.
3:30 - 4:00 pm
Faïz Djellouli - Holiseum
Feedback from over 150 industrial sites audited, the most frequent weaknesses and key success factors for harmonious security with stakeholders.
4:00 - 4:30 pm
Yves Grandmontagne - DcMag
At the close of the Industrial Cyber Sec Forum 2023, an exceptional round table will focus on the security and cybersecurity of your organization's most strategic industrial platform, where your services and data converge: the datacenter. The round table will be moderated by Yves Grandmontagne, editor-in-chief of DCmag.fr.
4:30 pm
Closing & networking