{"id":1483,"date":"2023-10-16T15:03:07","date_gmt":"2023-10-16T13:03:07","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=1483"},"modified":"2024-09-25T19:59:20","modified_gmt":"2024-09-25T17:59:20","slug":"conferences","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/en\/conferences\/","title":{"rendered":"Lyon 2023 conferences"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1483\" class=\"elementor elementor-1483\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d720511 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"d720511\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72fbf3c\" data-id=\"72fbf3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3287b92 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3287b92\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-63208c4 elementor-invisible\" data-id=\"63208c4\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e65b4b6 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"e65b4b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"422\" height=\"495\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/MicrosoftTeams-image-9.png\" class=\"attachment-large size-large wp-image-186\" alt=\"Favicon ICF\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6f6c37d elementor-invisible\" data-id=\"6f6c37d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c164149 elementor-widget elementor-widget-heading\" data-id=\"c164149\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Industrial Cybersec Forum<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab31740 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ab31740\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d925716 elementor-widget elementor-widget-heading\" data-id=\"d925716\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Event 2023<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17da62c elementor-widget elementor-widget-button\" data-id=\"17da62c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/mcevent.mark-com.com\/IndustrialCyberSecForum20231#\/?lang=fr\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Registrer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2a39df elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2a39df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1bf5e1e\" data-id=\"1bf5e1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-888b284 elementor-widget elementor-widget-heading\" data-id=\"888b284\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CONFERENCES 2023 - INDUSTRIAL CYBERSEC FORUM<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d89f949 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d89f949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4553882 elementor-widget elementor-widget-text-editor\" data-id=\"4553882\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You will find below, the program of the conferences which will be regularly updated.<\/p>\n<p>Here below, you can find the program of the conferences that will be regularly updated.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c8bf9a elementor-widget elementor-widget-heading\" data-id=\"4c8bf9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferences Salle Amp\u00e8re<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e4be0a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5e4be0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b3c4cd elementor-widget elementor-widget-accordion\" data-id=\"7b3c4cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1291\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1291\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">8:00 - 9:00 am<\/p><p class=\"texte-titre\">Welcome coffee<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1291\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1291\"><h3 class=\"vert\">Welcome coffee<\/h3><p class=\"heure\">8:00 - 9:00 am<\/p><p class=\"texte\">Come have a coffee with us !<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1292\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1292\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">9:00 - 9:30 am<\/p><p class=\"texte-titre\">Opening session - Cybersecurity in an industrial ecosystem.  <\/p><p class=\"pause\">MINALOGIC<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1292\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1292\"><h3><b>Cybersecurity for an industrial ecosystem.\u00a0<\/b><\/h3><p>9:00 - 9:30 am<\/p><p>Antoine Camus - Minalogic<\/p><p>Julien Dreano - Group Ciso Framatome\u00a0<\/p><p>Corporate networks are interconnected, IT and OT are converging, and the extended enterprise is becoming a reality. The cybersecurity of the ecosystem, i.e. the industrial company and its network of suppliers and partners, is becoming a crucial issue.\u00a0<\/p><p>Safety must be seen as the source of everything, not just as a brake and an investment, but also as a competitive advantage.<\/p><p>To protect yourself properly, you need to identify the main attack vectors and attacker profiles. We'll also give you the 10 essential rules for protecting your business, as well as the technical and financial means to help you implement them.<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Incyber-28112023.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1293\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1293\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">9:30 - 10:00 am<\/p><p class=\"texte-titre\">Assets, Vulnerabilities, Risk and Remediation, how to manage chaos?<\/p><p class=\"pause\">FRAMATOME<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1293\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1293\"><h3 class=\"bleu\"><strong>Assets, Vulnerabilities, Risk and Remediation, how to manage chaos?\u00a0<\/strong><\/h3><p class=\"heure\">9:30 - 10:00 am<\/p><p class=\"heure\">Pablo Ramirez Garcia - Framatome\u00a0<\/p><p><span style=\"font-weight: 400;\">In the complex and fast-changing world of cybersecurity, CISOs and industrial CISOs are called upon more than ever. They are navigating a sea of information, juggling asset management, vulnerability identification, threat neutralization and remediation strategy implementation, all in the context of constantly improving their cybersecurity posture and rigorously optimizing resources.<\/span><\/p><p><span style=\"font-weight: 400;\">In this context, we will present the determining factors and potential solutions to help cybersecurity managers in industrial environments address the complex subject of CSM.<\/span><\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/20231129_FRAMATOME-ICSF-Lyon-v1.1.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1294\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1294\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">10:30 - 11:00 am<\/p><p class=\"texte-titre\">EO cybersecurity &amp; data management<\/p><p class=\"pause\">EXCELSIOR SAFETY<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1294\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1294\"><h3 class=\"bleu\"><strong>Cyber and Big Data production, feedback from the CAC40 industry<\/strong><\/h3><p class=\"heure\">10:30 - 11:00 am<\/p><p class=\"heure\">Herv\u00e9 Bodinier - Excelsior Safety<\/p><p>How to manage production big DATA safely :<\/p><p>From managing IoT and IoT security and cybersecurity, to exporting big DATA to an external environment (cloud) accessible to data scientists.<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICSF-2023-Safety-security-big-DATA-excelsior-safety-final-fr.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1295\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1295\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">11:00 - 11:30 am<\/p><p class=\"texte-titre\">Coffee Break<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1295\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1295\"><h3 class=\"vert\">Coffee Break<\/h3><p class=\"heure\">11:00 - 11:30 am<\/p><p class=\"texte\">Networking room<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1296\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1296\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">11:30 - 12:00 am<\/p><p class=\"texte-titre\">Industrial Cybersecurity Optimization: Applying the IEC\/ISA 62443 standard for efficient and cost-effective control of IoT systems<\/p><p class=\"pause\">ALLENTIS<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1296\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1296\"><h3 class=\"bleu\" style=\"text-align: left;\"><b>Industrial Cybersecurity Optimization: Applying the IEC\/ISA 62443 standard for efficient and cost-effective control of IoT systems<\/b><\/h3><p class=\"heure\">11:30 - 12:00 am<\/p><p class=\"heure\">Gilles Loridon - Allentis<\/p><p><span style=\"font-weight: 400;\">This conference will provide industry feedback on the application of the IEC\/ISA 62443 industrial cybersecurity standard, with a focus on requirements and security levels for IoT systems (paragraph 3-3).<\/span><\/p><p><span style=\"font-weight: 400;\">It will show auditors the security control requirements, and how they depend on the targeted security level of the information system under consideration.<\/span><\/p><p><i><span style=\"font-weight: 400;\">For example, a secure injection system may have a higher level of security than a Historian system, given their impact on the network.<\/span><\/i><\/p><p><span style=\"font-weight: 400;\">After explaining the concepts of Zone\/Commodity, cardinal security level, SL, this conference will illustrate the whole process with the fundamental requirement n\u00b05, FR5, which concerns sensitive and critical flows.<\/span><i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><\/p><p><span style=\"font-weight: 400;\">The second part of the conference will highlight the lessons we have learned from our experiences in the field, in particular during the implementation of the FR5 requirement on restricted data flows, with a focus on SL-Target, SL-Capability and SL-Achieved through two real-life industrial examples.<\/span><\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/PPT-allentis-x-cyberium-Standard-ISA-62443-v2.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1297\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1297\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:00 - 12:30 pm<\/p><p class=\"texte-titre\">Techniques to optimize safety by reinforcing protection, and speed up investigations while controlling costs.<\/p><p class=\"pause\">KEYSIGHT<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1297\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1297\"><h3 class=\"bleu\"><b>Techniques to optimize safety by reinforcing protection, and speed up investigations while controlling costs.<\/b><\/h3><p class=\"heure\">12:00 - 12:30 pm<\/p><p class=\"heure\">Roxana Magdo - Keysight<\/p><p><span style=\"font-weight: 400;\">When it comes to safety, there are many critical factors to consider. We all understand that security is more than just prevention, because nothing can be guaranteed to be 100 %. It also encompasses our response to breaches, the recovery procedures we put in place, and the investigative methods we use. Throughout this security cycle, many challenges may arise. We'll take a look at some of these challenges and how to overcome them.<\/span><\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS-Lyon-Keysight-Roxana-Magdo.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1298\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1298\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:30 - 1:00 pm<\/p><p class=\"texte-titre\">Industrial cyber risks: from audit to threat management<\/p><p class=\"pause\">ALGOSECURE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1298\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1298\"><h3 class=\"bleu\"><strong>Industrial cyber risks: from audit to threat management.<\/strong><\/h3><p class=\"heure\">12:30 - 1:00 pm<\/p><p class=\"heure\">Hichame Ben Hassine - AlgoSecure\u00a0<\/p><p>In a complex environment where IT and OT converge, how can you identify your most critical assets, manage vulnerabilities and anticipate potential ransomware threats?\u00a0<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Presentation-Algosecure_risque-cyber-industriel-rancongiciels-1.0.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1299\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1299\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">1:00 - 2:00 pm<\/p><p class=\"texte-titre\">Lunch Break<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1299\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1299\"><h3 class=\"vert\">Lunch Break<\/h3>\n<p class=\"heure\">1:00 - 2:00 pm<\/p>\n<p class=\"texte\">Networking room<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-12910\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-12910\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">2:00 - 2:30 pm<\/p><p class=\"texte-titre\">Cybersecurity awareness: a dedicated approach to the industrial sector!<\/p><p class=\"pause\">CONSCIO TECHNOLOGIES<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-12910\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-12910\"><h3 class=\"bleu\"><strong>Cybersecurity awareness: a dedicated approach to the industrial sector!<\/strong><\/h3><p class=\"heure\">2:00 - 2:30 pm<\/p><p class=\"heure\">Ya\u00eblle Guillemot - Conscio Technologies<\/p><p>From the 8th most affected sector by cyberattacks in 2019, to the 2nd in 2021, industry has become a priority target for cybercriminals. The security of industrial systems has become a real challenge.<\/p><p>Thanks to our sector-specific approach to industry, we offer tailored content, co-constructed with industry CIOs and production engineers. Avoid the existing risks and threats of cyber-attacks, and discover how it's within everyone's reach to counter cybercriminals by adopting the right behaviors.<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Approche-Industrie-2.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-12911\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-12911\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">2:30 - 3:00 pm<\/p><p class=\"texte-titre\">A converged SOC: the answer to a global cyber threat impacting the IT and industrial landscape?<\/p><p class=\"pause\">SECUREWORKS &amp; IMS NETWORKS<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-12911\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-12911\"><h3 class=\"bleu\"><strong>A converged SOC: the answer to a global cyber threat impacting the IT and industrial landscape?<\/strong><\/h3><p class=\"heure\">2:30 - 3:00 pm<\/p><p class=\"heure\">St\u00e9phane Rabette - Secureworks\u00ae &amp; Sacha Hilic - IMS Networks<\/p><p>23% of cyber attacks affect industrial organizations, according to Gartner.<\/p><p>The risk has increased in recent years with the need to control industrial processes from an IT environment, without sufficient investment in cyber security.<\/p><p>A Pandora's box has opened for attackers, with the opportunity to target a vulnerable environment due to an architecture and equipment that underestimates the crucial role of cybersecurity.<\/p><p>The tools to identify cyber threats in environments are there, but the real advantage lies in integrating them into a 'converged' SOC (Security Operations Center) that can detect and react to threats in both IT and OT systems.<\/p><p>7 out of 10 industrial companies will adopt this convergence model by the end of 2025, according to Gartner. We'll see if this prediction is true during this session!<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Industrial-CyberSec-Forum-Lyon-IMS-Networks-et-Secureworks-CyberSOC-converge.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-12912\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-12912\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">3:00 - 3:30 pm<\/p><p class=\"texte-titre\">Brain hacking: social engineering innovations in 2023<\/p><p class=\"pause\">SO SAFE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-12912\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-12912\"><h3 class=\"bleu\"><b>Brain hacking: social engineering innovations in 2023<\/b><\/h3><p class=\"heure\">3:00 - 3:30 pm<\/p><p class=\"heure\">In\u00e8s Boutar - SoSafe<\/p><p>Cybercriminals are renowned for their remarkable technical skills, but did you know they're also capable of hacking into our brains?<\/p><p>Not only are they experts in computer systems, they also know perfectly well how the human mind works, and exploit ever more sophisticated methods of manipulation, from phishing to identity theft...<\/p><p>They use current events, such as global pandemics or economic crises, to convince us to make hasty, impulsive decisions. They have professionalized their methods, exploring new channels to approach their victims, and don't hesitate to use artificial intelligence to design more complex mass attacks.<\/p><p>In\u00e8s Boutar reveals the most effective tactics used by cybercriminals, and offers recommendations and best practices to protect us from them.<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SoSafe-Presentation-Hack-the-Brain-FR.pdf\">see conference +<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-12913\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-12913\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">3:30 - 4:00 pm<\/p><p class=\"texte-titre\">Industrial cybersecurity, or the need for a 360\u00b0 approach<\/p><p class=\"pause\">HOLISEUM<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-12913\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-12913\"><h3 class=\"bleu\"><strong>Industrial cybersecurity, or the need for a 360\u00b0 approach<\/strong><\/h3><p class=\"heure\">3:30 - 4:00 pm<\/p><p class=\"heure\">Fa\u00efz Djellouli - Holiseum<\/p><p>\u00a0<\/p><p>Feedback from over 150 industrial sites audited, the most frequent weaknesses and key success factors for harmonious security with stakeholders.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-12914\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-12914\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">4:00 - 4:30 pm<\/p><p class=\"texte-titre\">Round Table: Security and cybersecurity of strategic and industrial IT infrastructures: defending datacenters, computer rooms and data<\/p><p class=\"pause\">DCMAG<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-12914\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-12914\"><h3 class=\"bleu\"><strong>Security and cybersecurity for strategic and industrial IT infrastructures: defending datacenters, computer rooms and data<\/strong><\/h3><p class=\"heure\">4:00 - 4:30 pm<\/p><p class=\"heure\">Yves Grandmontagne - DcMag<\/p><p>\u00a0<\/p><p>At the close of the Industrial Cyber Sec Forum 2023, an exceptional round table will focus on the security and cybersecurity of your organization's most strategic industrial platform, where your services and data converge: the datacenter. The round table will be moderated by Yves Grandmontagne, editor-in-chief of DCmag.fr.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-12915\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-12915\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">4:30 pm<\/p><p class=\"texte-titre\">Closing + Cocktail + Networking<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-12915\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-12915\"><h3 class=\"vert\">Closing &amp; networking\u00a0<\/h3><p class=\"heure\">4:30 pm<\/p><p class=\"texte\">Closing &amp; networking\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Industrial Cybersec Forum Ev\u00e9nement 2023 Inscriptions CONFERENCES 2023 &#8211; INDUSTRIAL CYBERSEC FORUM Vous trouverez ci-dessous, le programme des conf\u00e9rences qui sera r\u00e9guli\u00e8rement mis \u00e0 jour. Here below, you can find the program of the conferences that will regularly be updated. Conf\u00e9rences Salle Amp\u00e8re 8:00 &#8211; 9:00 am Welcome coffee BREAK Welcome coffee 8:00 &#8211; 9:00 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1483","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/1483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/comments?post=1483"}],"version-history":[{"count":1,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/1483\/revisions"}],"predecessor-version":[{"id":2623,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/1483\/revisions\/2623"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/media?parent=1483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}