{"id":339,"date":"2022-11-16T18:00:34","date_gmt":"2022-11-16T17:00:34","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=339"},"modified":"2023-11-30T14:11:38","modified_gmt":"2023-11-30T13:11:38","slug":"conferences-be","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/en\/conferences-be\/","title":{"rendered":"Conferences"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"339\" class=\"elementor elementor-339\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f48567d elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"f48567d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7d8f61\" data-id=\"a7d8f61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b235c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b235c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d04bc47 elementor-invisible\" data-id=\"d04bc47\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2534e37 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"2534e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"422\" height=\"495\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/MicrosoftTeams-image-9.png\" class=\"attachment-large size-large wp-image-186\" alt=\"Favicon ICF\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e55039 elementor-invisible\" data-id=\"3e55039\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-713d30d elementor-widget elementor-widget-heading\" data-id=\"713d30d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Industrial Cybersec Forum<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b05c8bf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b05c8bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a2625d elementor-widget elementor-widget-heading\" data-id=\"2a2625d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferences<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1177811 elementor-widget elementor-widget-button\" data-id=\"1177811\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/mcevent.mark-com.com\/IndustrialCyberSecForum2023\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Registrer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3dd295c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3dd295c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2862f444\" data-id=\"2862f444\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e9243e9 elementor-widget elementor-widget-heading\" data-id=\"1e9243e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CONFERENCES 2023 - INDUSTRIAL CYBERSEC FORUM<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd1e5ac elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3fd1e5ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17d6647f elementor-widget elementor-widget-text-editor\" data-id=\"17d6647f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You will find below, the program of the conferences which will be regularly updated.<\/p><p>Here you will find the program of the conference, which will be regularly updated.<br><\/p>\n<p>Here below, you can find the program of the conferences that will be regularly updated.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707033a3 elementor-widget elementor-widget-heading\" data-id=\"707033a3\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"conference-1\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferences: Room <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12f6cd4b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"12f6cd4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa31778 elementor-widget elementor-widget-accordion\" data-id=\"1aa31778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4461\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4461\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">8:00 - 9:00 am<\/p><p class=\"texte-titre\">Welcome coffee<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4461\"><h3 class=\"vert\">Welcome coffee<\/h3>\n<p class=\"heure\">8:30 - 9:00 am<\/p>\n<p class=\"texte\">Come have a coffee with us !<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4462\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4462\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">9:00 - 9:30 am<\/p><p class=\"texte-titre\">Opening session - Cyber Security Obsolete ? Speak about Cyber Resilience now ! <\/p><p class=\"pause\">AGORIA<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4462\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4462\"><h3 class=\"bleu\">Opening Session -<b>Cyber Security Obsolete ? Speak about Cyber Resilience now !\u00a0<\/b><\/h3><p class=\"heure\">9:00 - 9:30 am<\/p><p class=\"heure\">Eric Van Cangh- Agoria<\/p><p><span style=\"font-weight: 400;\">\"We live in a world where digital transformation brings its share of advantages for our economy but also for our everyday life.<\/span><\/p><p><span style=\"font-weight: 400;\">The other side of the coin, it also increases the exposure of our company (including our data) to the outside world.<\/span><\/p><p><span style=\"font-weight: 400;\">Just look at what is happening in Belgium with the impacts on big cities, hospitals, multinational companies...<\/span><\/p><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Cybersecurity the set of means to protect our information at the level of people, processes and technology is on the table of most of our leaders.However, with the number of attacks, the sophistication of the attacks and the increasingly growing impact, <\/span><b>Cyber Security alone is becoming almost obsolete<\/b><span style=\"font-weight: 400;\"> (World economic forum April 2022)<\/span><\/p><p><span style=\"font-weight: 400;\">We are now talking about <\/span><b>Cyber Resilience,<\/b><span style=\"font-weight: 400;\"> this ability to resist to a change's effect like floods, fires and cyber-attacks.<\/span><\/p><p><span style=\"font-weight: 400;\">During this conference, the socio-economic state of cyber security in Belgium will be discussed (Agoria study Nov 2022) but also some notions on how to increase this cyber resilience for our industries and our public administrations<\/span><\/p><p><span style=\"font-weight: 400;\">At the end we will convince to you : Cyber resilience is a mindset to adopt.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4463\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4463\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">9:30 - 10:00 am<\/p><p class=\"texte-titre\">De-mystifying Active Query in OT networks<\/p><p class=\"pause\">Tenable<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4463\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4463\"><h3 class=\"bleu\"><strong>De-mystifying Active Query in OT networks<\/strong><b> \u00a0<\/b><\/h3><p class=\"heure\">9:30 - 10:00 am<\/p><p class=\"heure\">Dominic Storey - Tenable<\/p><p><span style=\"font-weight: 400;\">Mention \"network scanning\" and \"OT network\" in the same sentence and you will hear the cry - \"It's not safe! Yet OT vulnerability management deployments increasingly point to the inconvenient truth that passive discovery alone simply does not get the asset data necessary for security practitioners to do their jobs. How can security organizations safely resolve this paradox? This session explains how you can use active query methods safely and effectively in the OT environment and lays out a roadmap for getting buy-in from your concerned colleagues. We will also discuss real-world hybrid query scenarios and their benefits in reducing deployment costs and optimizing time-to-value of the deployed solution.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4464\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-4464\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">10:00 - 10:30 am<\/p><p class=\"texte-titre\">Business Continuity and Cyber Security: a mandatory collaboration to reach operational resilience<\/p><p class=\"pause\">SYNERGIT<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4464\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-4464\"><h3 class=\"bleu\"><strong>Business Continuity and Cyber Security: a mandatory collaboration to reach operational resilience<\/strong><\/h3><p class=\"heure\">10:00 - 10:30 am<\/p><p class=\"heure\">Christian De Boeck - SYNERGIT<\/p><p>The \"NIST\" cybersecurity framework (currently in version 1.1 released in 2018) has undertaken an update to version 2.0. The basic concept consisting of five functions (Identify, Protect, Detect, Respond and Recover) remains relevant, and so does, until now, the lack of enthusiasm of many cybersecurity teams to address this \"Recover\" part, which they believe should be covered \"elsewhere.\"<\/p><p>The challenge is indeed a major one: while most companies have developed Business Continuity Plans (BCP) which (hopefully) can build on their counterparts within IT departments (DRP plans), these initiatives are often not or only loosely coupled with cyber security, giving a false sense of security, especially when it comes to cyber threats.<\/p><p>With the rapid convergence of the IT and OT environments, the industrial risk resulting from a cyber-attack is only increasing and can endanger much more than just the targeted company.<\/p><p>At Synergit, we are committed to co-creating proven enterprise resilience. In this presentation, we will propose our approach in which CISOs \/ CISOs and security teams are uniquely positioned to federate all of these initiatives into a cross-functional approach that will provide robustness and resilience to improve business performance and ultimately survival<strong>.<\/strong><\/p><p class=\"texte\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4465\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-4465\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">10:30 - 11:00 am<\/p><p class=\"texte-titre\">Coffee Break<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4465\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-4465\"><h3 class=\"vert\">Coffee Break<\/h3>\n<p class=\"heure\">10:30 - 11:00 am<\/p>\n<p class=\"texte\">Networking room<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4466\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-4466\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">11:00 - 11:30 am<\/p><p class=\"texte-titre\">Best practices for securing OT\/IT Convergence <\/p><p class=\"pause\">THALES<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4466\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-4466\"><h3><strong>Best practices for securing OT\/IT Convergence<\/strong><\/h3><p class=\"heure\">11:00 - 11:30 am<\/p><p class=\"heure\">Soultana Ellinidou &amp; St\u00e9phanie Tonneau - THALES<\/p><p>With the fast evolvement in digital technologies and the drive towards remote and data-driven operations, the two environments of Operational Technology (OT) and Information Technology (IT) have begun to converge.  Technological advances such as the Internet of Things (IoT) and big data analytics have allowed the information world to better understand and influence the physical operational world. As OT grows increasingly similar to IT, the increased connectivity and criticality of the OT systems creates significant challenges for their adaptability, resilience, safety, and cyber security. Hence, change is critical to pursue a secure combined centralized IT-OT organization model. This change should happen by applying a set of best practices, which rely on international standards as IEC 62 443, helping to improve the cybersecurity posture to comply with the NIS2 Directive. These best practices will be extensively presented during the conference.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4467\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-4467\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">11:30 - 12:00 am<\/p><p class=\"texte-titre\">ISA-62443-3-3 Standard, lessons learn from the plant floor.<\/p><p class=\"pause\">CYBERIUM<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4467\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-4467\"><h3><strong>\"ISA-62443-3-3 Standard, lessons learn from the plant floor.\"<\/strong><\/h3><p class=\"heure\">11:30 - 12:00 am<\/p><p class=\"heure\">Gilles Loridon - Cyberium<\/p><p><span style=\"font-weight: 400;\">In this presentation, in the first part, we will introduce the audience to IEC\/ISA 62443 series of standards. Then we will focus on ISA-62443-3-3, which is System security requirements and security levels. In this standard, the security controls requirements depend of the Targeted Security level of the system in consideration. For Example, a Safety Injection System may have a higher Security Level than an Historian system, depending on their impact. We will briefly explain the concept of Zone &amp; conduits, cardinal to the Security Level, SL, and illustrate the all process with Foundational Requirement No5, FR5, Restricted Data Flow.<\/span><\/p><p><span style=\"font-weight: 400;\">In the second part of this presentation, we will look at lessons we learn on the plan floor while implementing FR5 Restricted Data Flow and we will focus on SL-Target, SL-Capability and SL-Achieved across two real-life examples.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4468\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-4468\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:00 - 12:30 pm<\/p><p class=\"texte-titre\">Defense in Depth<\/p><p class=\"pause\">SIEMENS<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4468\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-4468\"><h3 class=\"bleu\"><strong>Defense in Depth<\/strong><\/h3><p class=\"heure\">12:00 - 12:30 pm<\/p><p class=\"heure\">Amaury Poncin - SIEMENS<\/p><p><b><i>Secure communication in industrial networks<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">An approach that covers all levels simultaneously is essential to comprehensively protect industrial facilities both internally and externally - from operational to field level, from access control to copy protection. For this purpose, we use a strategy that provides defense throughout all levels: \"Defense in Depth\" is a comprehensive security concept based on plant security, network security, and system integrity. We are guided by the IEC 62443 standard, the leading standard for security in industrial automation.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4469\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-4469\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:30 - 1:00 pm<\/p><p class=\"texte-titre\">Cybersecurity for Space as a critical infrastructure <\/p><p class=\"pause\">RHEA<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4469\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-4469\"><h3 class=\"bleu\"><strong>Cybersecurity for Space as a critical infrastructure\u00a0<\/strong><\/h3><p class=\"heure\">12:30 - 1:00 pm<\/p><p class=\"heure\"><em>Pascal Rogiest<\/em> - RHEA<\/p><p>Space Systems have evolved over the last decade from simple communication bent-pipes, to complex data networks integrating satellite and ground communications and data-storage infrastructure. That has transformed space-systems into IT systems, rendering them potentially vulnerable to cyber-attacks. Moreover, the large increase of financial investments into Space, often coming from New Space entrepreneurs, have made Space Systems attractive from a monetary perspective. With high value and critical-services at stake, Space Systems have become prime targets to malicious stakeholders. Today, major cybersecurity systems are being deployed by EU and ESA in order to secure European space assets &amp; services. RHEA is the trusted partner of those organizations in so-called \" Cybersecurity for Space \".\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44610\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-44610\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">1:00 - 2:00 pm<\/p><p class=\"texte-titre\">Lunch Break<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44610\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-44610\"><h3 class=\"vert\">Lunch Break<\/h3>\n<p class=\"heure\">1:00 - 2:00 pm<\/p>\n<p class=\"texte\">Networking room<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44611\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-44611\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">2:00 - 2:30 pm<\/p><p class=\"texte-titre\">Reveal the invisible! : You can't protect what you can't see<\/p><p class=\"pause\">NET MEASURE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44611\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-44611\"><h3 class=\"bleu\"><strong>Reveal the invisible! : You can't protect what you can't see<\/strong><\/h3><p class=\"heure\">2:00 - 2:30 pm<\/p><p class=\"heure\"><em>Marc Foulon<\/em> - Net Measure<\/p><p>Marc Foulon presents the latest trends in DDoS attacks and shows you a real time tool of the current landscape.<\/p><p>The volume, duration and growing complexity of attacks require industries to equip themselves with the right tools at the right places in order to preserve the continuity of their business.<\/p><p>Total visibility, real-time source detection and investigation are the keys to success in your monitoring and security approach.<\/p><p>Marc Foulon will explain how to implement an NDR solution that unloads your firewall and provides you with always-on protection.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44612\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-44612\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">2:30 - 3:00 pm<\/p><p class=\"texte-titre\">Security for Data-Sciences Applications<\/p><p class=\"pause\">TIMI<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44612\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-44612\"><h3 class=\"bleu\"><strong>Security for Data-Sciences Applications<\/strong><\/h3><p class=\"heure\">2:30 - 3:00 pm<\/p><p class=\"heure\"><em>Frank Vanden Berghen<\/em> - Timi<\/p><p class=\"translation-block\">We will cover different aspect of how to implement proper Security in Data-Sciences Applications.<br>How to secure passwords in open source code? What are the implications of GDPR when it comes to security?<br>How can we mitigate security breaches with our teams of data scientists?<br>How should tools and processes be adapted to meet the requirements of resultd for the CDO and security for the CIO?<\/p><p>How can we mitigate security breaches with our teams of data scientists<\/p><p>How should tools and processes be adapted to meet the requirements of resultd for the CDO and security for the CIO?<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44613\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-44613\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">3:30 pm<\/p><p class=\"texte-titre\">Closing + Networking<\/p><p class=\"pause\">BREAK<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44613\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-44613\"><h3 class=\"vert\">Closing &amp; networking&nbsp;<\/h3>\n<p class=\"heure\">3:30 pm<\/p>\n<p class=\"texte\">Closing &amp; networking&nbsp;<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Industrial Cybersec Forum Inscriptions CONFERENCES 2023 &#8211; INDUSTRIAL CYBERSEC FORUM Vous trouverez ci-dessous, le programme des conf\u00e9rences qui sera r\u00e9guli\u00e8rement mis \u00e0 jour. Hieronder vindt u het programma van de conferentie, dat regelmatig zal worden bijgewerkt. Here below, you can find the program of the conferences that will regularly be updated. Conferences: Room 8:00 &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-339","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":0,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/339\/revisions"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/media?parent=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}