Here below, you can find the program of the conferences that will be regularly updated.
08:30 - 09:00 am
09:00 - 09:45 am
GREGORY DESCAMPS – Crisis & Business Continuity Senior Manager at GSK
In today's interconnected world, cyber attacks can have devastating effects on industrial operations, affecting people, the environment, assets and reputation. This session will focus on the crucial importance of putting in place robust continuity and crisis management plans before an attack occurs.
10:00 - 10:30 am
Fabien BENETEAU - Head of Sales & Marketing - F24
Cybercrime is on the rise. So much so that today, it's no longer a question of if a cyber attack will hit your company, but when. Questions you should be asking yourself: How would your organization cope with a major outage? What if it lasted more than a day? Are you equipped and able to get back to normal as quickly as possible? Find out how to limit the impact and get back to normal as quickly as possible.
Want to find out more about the conference?
Contact Chloé Martellota at the following address:
chloe.martellotta@f24.com
10:30 - 11:00 am
11:00 - 11:30 am
Come have a coffee with us !
11:30 - 12:00 am
The cloud is playing an increasingly significant role in information systems, and many companies are switching their applications and data to the cloud.
This technology offers the advantage of providing access to many more users (internal and external), although only the person for whom the information is intended needs to have access to it.
The cloud doesn't offer optimal security by default, and it's essential to think about security beforehand.
The security requirements for cloud solutions are identical to those for on-premise architecture.
Cyber security issues, protection of sensitive data and access controls are identical. Appropriate, long-term protection measures are therefore essential.
But before implementing any solutions, we need to think about how and for whom?
To ensure security in the cloud, as in any other IT environment, you need an access policy and tools tailored to your business.
A real challenge that doesn't have to be a gas factory!
12:00 - 12:30 am
The Business Contintuity Institute (www.thebci.org) carries out several studies each year on the various aspects of continuity and resilience. Come and discover the latest trends synthesized in this presentation, which will report on what several hundred companies surveyed in Europe and around the world have experienced over the past year, and what the trends are for the future: evolving threats, solutions provided, changes in perception and paradigm, etc. You'll come away with information and arguments that are essential for changing your company's cyber-security practices.
12:30 - 1:00 pm
In a context where cybersecurity resources are limited and malicious actors are seizing on new must-have tools such as AI, companies and organizations face growing cybersecurity challenges. However, artificial intelligence can also be used to support security tools and operators, facilitating detection, incident response and vulnerability management. Fujitsu sheds light on these uses of AI in a cybersecurity context and their implementation.
1:00 pm - 2:00 pm
Come have a coffee with us !
2:00 pm - 2:30 pm
OneLiiF, the bridge between patient & the healthcare ecosystem: improving the patient health journey & outcome
At OneLiifour mission is to empower patients with seamless and secure access to their medical data, ensuring they have the ability to share vital health information with chosen professionals and caregivers. We strive to facilitate effective communication between patients and healthcare providers, enhancing the quality of care through our innovative, patient-friendly and centric platform.
Our commitment is to provide tools that enable patients to check medication interactions and symptoms in a medically approved manner, fostering a collaborative and informed healthcare journey.
2:30 pm - 3:00 pm
3:00 pm - 3:30 pm
This session will explore how to effectively quantify cyber risks in financial terms, helping organizations better understand, manage, and prioritize cybersecurity threats. Attendees will learn key risk management principles and techniques to translate technical risks into actionable, business-aligned insights.
3:30 pm
Closing & networking