{"id":2493,"date":"2024-04-09T12:53:22","date_gmt":"2024-04-09T10:53:22","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=2493"},"modified":"2024-10-16T12:31:07","modified_gmt":"2024-10-16T10:31:07","slug":"conferences-2","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/en\/conferences-2\/","title":{"rendered":"Conferences Nivelles 2024"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2493\" class=\"elementor elementor-2493\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f48567d elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"f48567d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7d8f61\" data-id=\"a7d8f61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b235c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b235c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d04bc47 elementor-invisible\" data-id=\"d04bc47\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2534e37 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"2534e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"422\" height=\"495\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/MicrosoftTeams-image-9.png\" class=\"attachment-large size-large wp-image-186\" alt=\"Favicon ICF\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e55039 elementor-invisible\" data-id=\"3e55039\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-713d30d elementor-widget elementor-widget-heading\" data-id=\"713d30d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Industrial Cybersec Forum<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b05c8bf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b05c8bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a2625d elementor-widget elementor-widget-heading\" data-id=\"2a2625d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferences Nivelles 2024<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3dd295c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3dd295c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2862f444\" data-id=\"2862f444\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e9243e9 elementor-widget elementor-widget-heading\" data-id=\"1e9243e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CONFERENCES 2024 - INDUSTRIAL CYBERSEC FORUM<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd1e5ac elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3fd1e5ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17d6647f elementor-widget elementor-widget-text-editor\" data-id=\"17d6647f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here below, you can find the program of the conferences that will be regularly updated.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707033a3 elementor-widget elementor-widget-heading\" data-id=\"707033a3\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"conference-1\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferences: Room <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12f6cd4b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"12f6cd4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa31778 elementor-widget__width-initial elementor-widget elementor-widget-accordion\" data-id=\"1aa31778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4461\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4461\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">08:30 - 09:00 <\/p><p class=\"texte-titre\">Welcome coffee<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4461\"><h3 class=\"vert\">Welcome coffee<\/h3>\n<p class=\"heure\">08:30 - 09:00 am<\/p>\n<p class=\"texte\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4462\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4462\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">09:00 - 09:45<\/p><p class=\"texte-titre\">OPENING SESSION: KEYNOTE: Cyber-attacks and resilience: Ensuring operational continuity in the industrial sector<\/p><p class=\"pause\"> GSK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4462\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4462\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>Opening Session - Keynote: Cyber-attacks and resilience: Ensuring operational continuity in the industrial sector<\/strong><\/h3><p class=\"heure\">09:00 - 09:45 am<\/p><p class=\"heure\"><strong>GREGORY DESCAMPS<\/strong> \u2013\u00a0<em>Crisis &amp; Business Continuity Senior Manager at GSK<\/em><\/p><p>\u00a0<\/p><p><span style=\"color: #000000;\">In today's interconnected world, cyber attacks can have devastating effects on industrial operations, affecting people, the environment, assets and reputation. This session will focus on the crucial importance of putting in place robust continuity and crisis management plans before an attack occurs.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4463\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4463\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">10:00 - 10:30<\/p><p class=\"texte-titre\"> Cybersecurity: risks, best practices &amp; challenges of the new European NIS2 directive<\/p><p class=\"pause\">F24<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4463\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4463\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>Cybersecurity: risks, best practices &amp; challenges of the new European NIS2 directive<\/strong><\/h3><p class=\"heure\">10:00 - 10:30 am<\/p><p class=\"heure\"><strong>Fabien BENETEAU<\/strong> - Head of Sales &amp; Marketing - F24\u00a0<\/p><p>\u00a0<\/p><p><span style=\"color: #000000;\">Cybercrime is on the rise. So much so that today, it's no longer a question of if a cyber attack will hit your company, but when. Questions you should be asking yourself: How would your organization cope with a major outage? What if it lasted more than a day? Are you equipped and able to get back to normal as quickly as possible? Find out how to limit the impact and get back to normal as quickly as possible.<\/span><\/p><p><span style=\"color: #000000;\">\u00a0<\/span><\/p><p><span style=\"color: #888888; font-family: Roboto, sans-serif; font-size: 15px; background-color: #f9f9f9;\">Want to find out more about the conference?<\/span><br style=\"color: #888888; font-family: Roboto, sans-serif; font-size: 15px; background-color: #f9f9f9;\" \/><span style=\"color: #888888; font-family: Roboto, sans-serif; font-size: 15px; background-color: #f9f9f9;\">Contact Chlo\u00e9 Martellota at the following address:<\/span><br style=\"color: #888888; font-family: Roboto, sans-serif; font-size: 15px; background-color: #f9f9f9;\" \/><span style=\"color: #888888; font-family: Roboto, sans-serif; font-size: 15px; background-color: #f9f9f9;\">chloe.martellotta@f24.com<\/span><span style=\"color: #000000;\"><br \/><\/span><\/p><p class=\"heure\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4464\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-4464\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">10:30 - 11:00 <\/p><p class=\"texte-titre\"> The 8 cybercrime trends to watch out for<\/p><p class=\"pause\"> SOSAFE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4464\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-4464\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>The 8 cybercrime trends to watch out for<\/strong><\/h3><p class=\"heure\">10:30 - 11:00 am<\/p><div><span style=\"color: #000000;\"><strong>BAS VAN ERK<\/strong><b><\/b><i><b> \u2013 <\/b><\/i>Director Benelux &amp; Nordics &amp; <strong>PIERRE NOEL -<\/strong> The collectionist - SOSAFE<\/span><\/div><div>\u00a0<\/div><div><span style=\"color: #000000;\">AI changed everything last year: who will now harness the power of new technologies and the psychology of human behavior more effectively - us or the cybercriminals? In our talk, we'll explore the biggest cybercrime trends and challenges that security teams are currently facing. But most importantly, we'll provide you with crucial and actionable security tips to help you efficiently improve your security approach in the long run.<\/span><\/div><div><span style=\"color: #000000;\">\u00a0<\/span><\/div><div><span style=\"color: #000000;\"><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Security-Forum-Cybercrime-Trends.pdf\">See the conference<\/a><\/span><\/div><p class=\"heure\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4465\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-4465\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">11:00 - 11:30 <\/p><p class=\"texte-titre\">\u00a0Coffee Break &amp; Networking<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4465\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-4465\"><h3 class=\"vert\">\u00a0Coffee Break &amp; Networking<\/h3><p class=\"heure\">11:00 - 11:30 am<\/p><p class=\"texte\">Come have a coffee with us !<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4466\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-4466\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">11:30 - 12:00<\/p><p class=\"texte-titre\">How can you calmly tackle access management and security in your cloud migration projects? <\/p><p class=\"pause\"> CYBERXPERT<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4466\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-4466\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>Move to the cloud: Cyber access and identity strategy<\/strong><\/h3><p class=\"heure\">11:30 - 12:00 am<\/p><div><span style=\"color: #000000;\"><b>FABRICE HECQUET<i> \u2013 <\/i><\/b>CEO - CYBERXPERT<\/span><\/div><p>\u00a0<\/p><p><span style=\"color: #000000;\">The cloud is playing an increasingly significant role in information systems, and many companies are switching their applications and data to the cloud.<\/span><\/p><p><span style=\"color: #000000;\">This technology offers the advantage of providing access to many more users (internal and external), although only the person for whom the information is intended needs to have access to it.<\/span><\/p><p><span style=\"color: #000000;\">The cloud doesn't offer optimal security by default, and it's essential to think about security beforehand.<\/span><\/p><p><span style=\"color: #000000;\">The security requirements for cloud solutions are identical to those for on-premise architecture.<\/span><\/p><p><span style=\"color: #000000;\">Cyber security issues, protection of sensitive data and access controls are identical.  Appropriate, long-term protection measures are therefore essential.<\/span><\/p><p><span style=\"color: #000000;\">But before implementing any solutions, we need to think about how and for whom?<\/span><\/p><p><span style=\"color: #000000;\">To ensure security in the cloud, as in any other IT environment, you need an access policy and tools tailored to your business.<\/span><\/p><p><span style=\"color: #000000;\">A real challenge that doesn't have to be a gas factory!<br \/><br \/><\/span><\/p><p><span style=\"color: #000000;\"><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Moveto2cloud-Security-Forum.pdf\">See the conference<\/a>\u00a0<\/span><\/p><p class=\"heure\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4467\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-4467\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:00 - 12:30<\/p><p class=\"texte-titre\">How new regulations are bringing continuity and safety players closer together to ensure operational resilience <\/p><p class=\"pause\"> SYNERGIT<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4467\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-4467\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>How new regulations (DORA, NIS-2, CER...) are bringing continuity and (cyber-) security players closer together to ensure operational resilience: presentation of research from the Business Continuity Institutes.<\/strong><\/h3><p class=\"heure\">12:00 - 12:30 am<\/p><div><span style=\"color: #000000;\"><b>CHRISTIAN DE BOECK<i> \u2013 <\/i><\/b>Leader of the Belgian chapter of the Business Continuity Institute and Managing Director - SYNERGIT<\/span><\/div><div>\u00a0<\/div><p><span style=\"color: #000000;\">The Business Contintuity Institute (<a style=\"color: #000000;\" href=\"https:\/\/www.thebci.org\/\">www.thebci.org<\/a>) carries out several studies each year on the various aspects of continuity and resilience. Come and discover the latest trends synthesized in this presentation, which will report on what several hundred companies surveyed in Europe and around the world have experienced over the past year, and what the trends are for the future: evolving threats, solutions provided, changes in perception and paradigm, etc. You'll come away with information and arguments that are essential for changing your company's cyber-security practices.<\/span><\/p><p><span style=\"color: #000000;\">\u00a0<\/span><\/p><p><span style=\"color: #000000;\"><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Cyber-Security-Forum-20241003-v2.02c.pdf\">See the conference<\/a><\/span><\/p><p class=\"heure\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4468\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-4468\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:30 - 13:00<\/p><p class=\"texte-titre\">AI as a cybersecurity assistance tool: what are the challenges and opportunities?<\/p><p class=\"pause\"> FUJITSU <\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4468\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-4468\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>AI as a cybersecurity assistance tool: what are the challenges and opportunities?\u00a0<\/strong><\/h3><p class=\"heure\">12:30 - 1:00 pm<\/p><div><span style=\"color: #000000;\"><b>ADRIEN OTTAVINO<i> \u2013 <\/i><\/b>Cybersecurity sales specialist &amp; <strong>SOFIANE LAGRAA<\/strong> - Team Lead Of Security Innovation - FUJITSU\u00a0<\/span><\/div><p>\u00a0<\/p><p><span style=\"color: #000000;\">In a context where cybersecurity resources are limited and malicious actors are seizing on new must-have tools such as AI, companies and organizations face growing cybersecurity challenges. However, artificial intelligence can also be used to support security tools and operators, facilitating detection, incident response and vulnerability management. Fujitsu sheds light on these uses of AI in a cybersecurity context and their implementation.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4469\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-4469\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">13:00 - 14:00 <\/p><p class=\"texte-titre\">\u00a0Lunch Break &amp; Networking<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4469\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-4469\"><h3 class=\"vert\">Lunck Break &amp; Networking<\/h3><p class=\"heure\">1:00 pm - 2:00 pm<\/p><p class=\"texte\">Come have a coffee with us !<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44610\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-44610\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">14:00 - 14:30<\/p><p class=\"texte-titre\">OneLiiF : We only have one life, worth securing and protecting<\/p><p class=\"pause\"> OneLiiF <\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44610\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-44610\"><h3 style=\"text-align: left;\"><strong>OneLiiF : We only have one life, worth securing and protecting<\/strong><\/h3>\n<p><span style=\"color: #000000;\">2:00 pm - 2:30 pm<\/span><\/p>\n<div><span style=\"color: #000000; font-family: Aptos, sans-serif; font-size: 14.6667px;\"><b>Jan VEKEMANS <\/b><\/span><span style=\"color: #000000; font-family: Aptos, sans-serif; font-size: 14.6667px; font-weight: var( --e-global-typography-text-font-weight );\">- CEO<\/span><span style=\"color: #000000; font-family: Aptos, sans-serif; font-size: 14.6667px; font-weight: var( --e-global-typography-text-font-weight );\">&nbsp;&amp;&nbsp;<\/span><span style=\"color: #000000;\"><b>GERT VANHAEGHT<i> \u2013 <\/i><\/b>CTO&nbsp;<\/span><\/div>\n<div><span style=\"color: #000000;\"><br><\/span><\/div>\n<p><span style=\"color: #000000;\"><span lang=\"en-US\">OneLiiF, the bridge between patient &amp;&nbsp;<\/span><span lang=\"en-US\">the healthcare ecosystem: <\/span><b><span lang=\"en-US\">improving the patient health journey &amp; outcome<\/span><\/b><\/span><\/p>\n<p><span style=\"color: #000000;\"><span lang=\"en-US\">At&nbsp;<b>OneLiif<\/b>our mission is to&nbsp;<b>empower patients with seamless and secure access to their medical data<\/b>, ensuring they have the ability to&nbsp;<b>share vital health information with chosen professionals and caregivers<\/b>. We strive to facilitate effective communication between patients and healthcare providers,&nbsp;<b>enhancing the quality of care&nbsp;<\/b>through our innovative,&nbsp;<b>patient-friendly and centric&nbsp;<\/b>platform.<\/span><\/span><\/p>\n<p><span lang=\"en-US\" style=\"color: #000000;\">Our commitment is to&nbsp;<b>provide tools that enable patients to check medication interactions and symptoms<\/b>&nbsp;in a medically approved manner, fostering a collaborative and informed healthcare journey.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44611\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-44611\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">14:30 - 15:00<\/p><p class=\"texte-titre\">Cybersecurity and regulatory compliance: anonymization strategies to protect personal data against leakage risks<\/p><p class=\"pause\"> ARCAD SOFTWARE <\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44611\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-44611\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>Cybersecurity and regulatory compliance: anonymization strategies to protect personal data against leakage risks<\/strong><\/h3><p class=\"heure\">2:30 pm - 3:00 pm<\/p><div><span style=\"color: #000000;\"><b>CHRISTOPHE LARIVIERRE - <\/b>Business Development Manager\u00a0<\/span><\/div><div>\u00a0<\/div><div><span style=\"color: #000000;\">This conference explores best practices in cybersecurity and regulatory compliance, with a focus on anonymization strategies. <\/span><span style=\"color: #000000;\">data protection. Find out how to effectively protect personal data against the risk of leakage, while complying with legal requirements. We will <\/span><span style=\"color: #000000;\">share innovative ways of securing, using and sharing your sensitive information, while guaranteeing its confidentiality.<\/span><\/div><div><span style=\"color: #000000;\">\u00a0<\/span><\/div><div><span style=\"color: #000000;\"><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/CLA-Security-Forum-Nivelles-03.10.2024.pptx\">See the conference<\/a><\/span><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44612\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-44612\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">15:00 - 15:30<\/p><p class=\"texte-titre\">Cyber Risk Management: A Quantification Approach in Financial Terms?<\/p><p class=\"pause\"> ISACA <\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44612\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-44612\"><h3 class=\"bleu\" style=\"text-align: left;\"><strong>Cyber Risk Management: A Quantification Approach in Financial Terms<\/strong><\/h3><p>\u00a0<\/p><p class=\"heure\">3:00 pm - 3:30 pm<\/p><div><span style=\"color: #000000;\"><b>KIAN BAYAT<i> \u2013 <\/i><\/b>DIRECTOR &amp; ACADEMIC RELATIONS\u00a0<\/span><\/div><div>\u00a0<\/div><p><span style=\"color: #000000;\">This session will explore how to effectively quantify cyber risks in financial terms, helping organizations better understand, manage, and prioritize cybersecurity threats. Attendees will learn key risk management principles and techniques to translate technical risks into actionable, business-aligned insights.<\/span><\/p><p><span style=\"color: #000000;\">\u00a0<\/span><\/p><p><span style=\"color: #000000;\"><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Cyber-Risk-Mgmt-A-Quantification-Approach-in-Financial-Terms-v1.0.pptx\">See the conference<\/a><\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44613\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-44613\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\"> 15:30 <\/p><p class=\"texte-titre\">Closing + Networking<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44613\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-44613\"><h3 class=\"vert\">Closing &amp; Networking\u00a0<\/h3><p class=\"heure\">3:30 pm<\/p><p class=\"texte\">Closing &amp; networking\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Industrial Cybersec Forum CONFERENCES 2024 &#8211; INDUSTRIAL CYBERSEC FORUM Here below, you can find the program of the conferences that will regularly be updated. Conferences: Room 08:30 &#8211; 09:00 Welcome coffee BREAK Welcome coffee 08:30 &#8211; 09:00 am \u00a0 09:00 &#8211; 09:45 OPENING SESSION: KEYNOTE : Cyber-attaques et r\u00e9silience : Assurer la continuit\u00e9 op\u00e9rationnelle dans [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2493","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/2493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/comments?post=2493"}],"version-history":[{"count":63,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/2493\/revisions"}],"predecessor-version":[{"id":2694,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/2493\/revisions\/2694"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/media?parent=2493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}