{"id":4153,"date":"2026-04-22T12:35:25","date_gmt":"2026-04-22T10:35:25","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=4153"},"modified":"2026-04-22T14:49:37","modified_gmt":"2026-04-22T12:49:37","slug":"dagindeling","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/nl\/days-schedule\/","title":{"rendered":"Dagindeling"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4153\" class=\"elementor elementor-4153\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ddf02e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ddf02e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:4156,&quot;url&quot;:&quot;https:\\\/\\\/industrial-cybersec.com\\\/wp-content\\\/uploads\\\/shutterstock_519683941.jpg&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ed9120\" data-id=\"8ed9120\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a5d8a76 elementor-widget elementor-widget-spacer\" data-id=\"a5d8a76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5220e32 elementor-widget elementor-widget-spacer\" data-id=\"5220e32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6cb324 elementor-widget elementor-widget-spacer\" data-id=\"a6cb324\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3781852 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3781852\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fcb8b34\" data-id=\"fcb8b34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e070fd elementor-widget elementor-widget-spacer\" data-id=\"4e070fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-812c332 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"812c332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">D\u00e9couvrez le programme de la journ\u00e9e !<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32f18dc elementor-widget elementor-widget-spacer\" data-id=\"32f18dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fc9094 elementor-widget elementor-widget-heading\" data-id=\"5fc9094\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Quand ? Le 28 avril 2026<br><br>O\u00f9 ? Au Sheraton Brussels Airport Hotel (Zaventem\/Bruxelles)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-aed19f0\" data-id=\"aed19f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-704d2a4 elementor-widget elementor-widget-spacer\" data-id=\"704d2a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-939abc0 elementor-widget elementor-widget-image\" data-id=\"939abc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/RSC.png\" title=\"RSC\" alt=\"RSC\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-499e288 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"499e288\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8af3306\" data-id=\"8af3306\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8f7829 elementor-widget elementor-widget-spacer\" data-id=\"e8f7829\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abe2b8e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"abe2b8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vos temps de pause\/ networking :<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cea6d34 elementor-widget elementor-widget-spacer\" data-id=\"cea6d34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-287bda2 elementor-widget elementor-widget-accordion\" data-id=\"287bda2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4241\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4241\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Caf\u00e9 d'Accueil (13h-13h30)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4241\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4241\"><p>Accueil des visiteurs au Sheraton Brussels Airport Hotel.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4242\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4242\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Pause Caf\u00e9 & Networking (15h15-15h45)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4242\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4242\"><p>C\u2019est le moment d\u2019\u00e9changer autour d\u2019un caf\u00e9, d&rsquo;aller \u00e0 la rencontre des sponsors et autres visiteurs. Ensuite, place \u00e0 la 2\u00e8me partie de conf\u00e9rences de l&rsquo;apr\u00e8s-midi.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4243\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4243\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Walking Dinner for Networking (18h-20h)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4243\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4243\"><p>Walking dinner de fin d\u2019\u00e9v\u00e9nement : boissons \u00e0 la sortie des salles de conf\u00e9rence, puis repas assis ou debout (tables hautes) \u00e0 l\u2019italienne pour cl\u00f4turer la journ\u00e9e.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39472a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39472a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-99cc543\" data-id=\"99cc543\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da3859d elementor-widget elementor-widget-image\" data-id=\"da3859d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2048\" height=\"2048\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/DC.png\" class=\"attachment-large size-large wp-image-3659\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/DC.png 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/DC-768x768.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/DC-1536x1536.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/DC-12x12.png 12w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-2879a91\" data-id=\"2879a91\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b113a1 elementor-widget elementor-widget-image\" data-id=\"7b113a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SF-768x768.png\" class=\"attachment-medium_large size-medium_large wp-image-3661\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SF-768x768.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SF-1536x1536.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SF-12x12.png 12w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SF.png 2048w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-be707d9\" data-id=\"be707d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82c2ea1 elementor-widget elementor-widget-image\" data-id=\"82c2ea1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2048\" height=\"2048\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS.png\" class=\"attachment-large size-large wp-image-3660\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS.png 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS-768x768.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS-1536x1536.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS-12x12.png 12w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-6dfa9d8\" data-id=\"6dfa9d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4fde8d elementor-widget elementor-widget-image\" data-id=\"a4fde8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"2048\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BCC-1.png\" class=\"attachment-large size-large wp-image-3662\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BCC-1.png 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BCC-1-768x768.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BCC-1-1536x1536.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BCC-1-12x12.png 12w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-093ffdb\" data-id=\"093ffdb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e422ede elementor-widget elementor-widget-image\" data-id=\"e422ede\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"2048\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/IA-Convention.png\" class=\"attachment-large size-large wp-image-4196\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/IA-Convention.png 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/IA-Convention-768x768.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/IA-Convention-1536x1536.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/IA-Convention-12x12.png 12w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82203bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82203bf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dd508c3\" data-id=\"dd508c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0e77c57 elementor-widget elementor-widget-spacer\" data-id=\"0e77c57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b847881 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b847881\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les interventions sur la s\u00e9curit\u00e9, la cybers\u00e9curit\u00e9 et leur industrie<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bb146f elementor-widget elementor-widget-spacer\" data-id=\"8bb146f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b87b18 elementor-widget elementor-widget-heading\" data-id=\"9b87b18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pourquoi r\u00e9unir les experts de la s\u00e9curit\u00e9 et de la cybers\u00e9curit\u00e9 industrielle autour des enjeux de r\u00e9silience et de souverainet\u00e9 ?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39a4802 elementor-widget elementor-widget-text-editor\" data-id=\"39a4802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans un contexte marqu\u00e9 par l\u2019intensification des cybermenaces et la d\u00e9pendance croissante des organisations aux syst\u00e8mes num\u00e9riques, la s\u00e9curit\u00e9 constitue un pilier essentiel de la r\u00e9silience des infrastructures et des services. Les \u00e9volutions r\u00e9glementaires europ\u00e9ennes, notamment avec la directive NIS2, renforcent par ailleurs les exigences en mati\u00e8re de gestion des risques, de gouvernance et de protection des syst\u00e8mes critiques. R\u00e9unir les experts de la s\u00e9curit\u00e9 et de la cybers\u00e9curit\u00e9 permet ainsi d\u2019analyser l\u2019\u00e9volution des menaces, d\u2019\u00e9changer sur les pratiques de protection des syst\u00e8mes d\u2019information et des infrastructures, et d\u2019identifier les approches permettant de renforcer durablement la r\u00e9silience et l\u2019autonomie technologique.<\/p><p><strong>Cliquez sur chaque box du programme pour d\u00e9ployer son contenu et consulter les informations relatives aux conf\u00e9rences (programme en cours de remplissage).<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51f1dd5 elementor-widget elementor-widget-accordion\" data-id=\"51f1dd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8591\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-8591\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">13h30-14h | Keynote de Philippe Cornette : Surfer sur le tsunami de la r\u00e9glementation cybern\u00e9tique\u00a0; transformer la cybers\u00e9curit\u00e9 en avantage concurrentiel<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8591\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-8591\"><p>La cybers\u00e9curit\u00e9 est devenue un enjeu strat\u00e9gique majeur pour les organisations modernes. Pourtant, nombreuses sont les entreprises qui la per\u00e7oivent encore comme un simple probl\u00e8me technique ou une obligation de conformit\u00e9.<\/p><p>Lors de cette conf\u00e9rence, Philippe Cornette partagera son exp\u00e9rience de terrain en mati\u00e8re de s\u00e9curit\u00e9 au sein d&rsquo;un groupe industriel international pr\u00e9sent dans les secteurs de la d\u00e9fense, de l&rsquo;\u00e9nergie et de l&rsquo;industrie lourde, et implant\u00e9 dans plus de trente pays.<\/p><p>Fort de plus de trente ans d&rsquo;exp\u00e9rience, il expliquera pourquoi le v\u00e9ritable d\u00e9fi de la cybers\u00e9curit\u00e9 r\u00e9side non pas dans la technologie, mais dans le leadership, la gouvernance et la capacit\u00e9 \u00e0 transformer les risques en d\u00e9cisions strat\u00e9giques.<\/p><p>De la protection du savoir-faire industriel contre l&rsquo;espionnage \u00e0 la gestion du d\u00e9luge de r\u00e9glementations telles que NIS2, cette conf\u00e9rence offrira une vision claire et pragmatique des mesures que les organisations doivent prendre d\u00e8s aujourd&rsquo;hui pour rester r\u00e9silientes dans un monde num\u00e9rique de plus en plus hostile.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8592\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-8592\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">14h-14h25 | Conf\u00e9rence de Ignacio Berrozpe (THALES) : La cl\u00e9 de la souverainet\u00e9 num\u00e9rique<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8592\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-8592\"><div class=\"relative basis-auto flex-col -mb-(--composer-overlap-px) [--composer-overlap-px:28px] grow flex\"><div class=\"flex flex-col text-sm pb-25\"><article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:84b48674-5aea-4bb9-947b-52550202e6c3-4\" data-testid=\"conversation-turn-10\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"be885d78-3f54-46a2-b68b-d19226ac923b\" data-message-model-slug=\"gpt-5-3\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"50\" data-end=\"303\">Lors de cette conf\u00e9rence, Ignacio Berrozpe abordera le d\u00e9fi croissant de la protection des donn\u00e9es dans le cloud, en expliquant comment les organisations peuvent s\u00e9curiser des informations sensibles tout en s\u2019appuyant sur des infrastructures externes.<\/p><p data-start=\"305\" data-end=\"509\">Il pr\u00e9sentera \u00e9galement le concept de <strong data-start=\"343\" data-end=\"360\">Root of Trust<\/strong>, qui garantit que les syst\u00e8mes reposent sur des composants de confiance afin d\u2019assurer la s\u00e9curit\u00e9 et l\u2019int\u00e9grit\u00e9 d\u00e8s la base de l\u2019infrastructure.<\/p><p data-start=\"511\" data-end=\"925\">Par ailleurs, la pr\u00e9sentation explorera la mani\u00e8re dont les organisations peuvent prot\u00e9ger leurs donn\u00e9es sensibles, quel que soit leur emplacement : sur des syst\u00e8mes locaux, dans le cloud ou au sein d\u2019environnements hybrides. Pour illustrer ces enjeux, il pr\u00e9sentera un cas concret de mise en \u0153uvre du chiffrement dans le cloud, mettant en \u00e9vidence l\u2019importance du chiffrement et d\u2019une gestion efficace des cl\u00e9s.<\/p><p data-start=\"927\" data-end=\"1203\">Enfin, la conf\u00e9rence examinera la notion de contr\u00f4le souverain, en expliquant pourquoi de nombreuses organisations choisissent le mod\u00e8le <strong data-start=\"1064\" data-end=\"1097\">\u00ab Hold Your Own Keys \u00bb (HYOK)<\/strong> afin de conserver le contr\u00f4le de leurs cl\u00e9s de chiffrement et de renforcer leur souverainet\u00e9 num\u00e9rique.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/article><\/div><\/div><div id=\"thread-bottom-container\" class=\"sticky bottom-0 group\/thread-bottom-container relative isolate z-10 w-full basis-auto has-data-has-thread-error:pt-2 has-data-has-thread-error:[box-shadow:var(--sharp-edge-bottom-shadow)] md:border-transparent md:pt-0 dark:border-white\/20 md:dark:border-transparent print:hidden content-fade single-line flex flex-col\"><div id=\"thread-bottom\"><div class=\"text-base mx-auto [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 mb-[var(--thread-component-gap,1rem)]\"><div class=\"pointer-events-auto relative z-1 flex h-(--composer-container-height,100%) max-w-full flex-(--composer-container-flex,1) flex-col\"><form class=\"group\/composer w-full\" data-type=\"unified-composer\"><div class=\"\"><div class=\"bg-token-bg-primary corner-superellipse\/1.1 cursor-text overflow-clip bg-clip-padding p-2.5 contain-inline-size motion-safe:transition-colors motion-safe:duration-200 motion-safe:ease-in-out dark:bg-[#303030] grid grid-cols-[auto_1fr_auto] [grid-template-areas:'header_header_header'_'leading_primary_trailing'_'._footer_.'] group-data-expanded\/composer:[grid-template-areas:'header_header_header'_'primary_primary_primary'_'leading_footer_trailing'] shadow-short-composer\" data-composer-surface=\"true\"><div class=\"flex items-center gap-2 [grid-area:trailing]\"><div class=\"ms-auto flex items-center gap-1.5\"><div><div class=\"relative\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/form><\/div><\/div><\/div><\/div><\/div><p><span style=\"color: #ffffff;\">To dowload your FREE digital sovereignty book by Thales, click<\/span><span style=\"color: #ffffff;\">\u00a0<\/span><a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/THALES-Digital-Sovereignty-HALF-A5-1.pdf\">HERE<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8593\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-8593\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">14h25-14h50 | Conf\u00e9rence de Ron Mukherjee (ESET) :  S\u00e9curiser l\u2019avenir num\u00e9rique de l\u2019Europe : souverainet\u00e9 de l\u2019UE, renseignement sur les menaces et mise en conformit\u00e9 progressive avec les solutions XDR et MDR<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8593\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-8593\"><section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:8346617c-2dca-4b52-9da7-6d29d3230c6c-12\" data-testid=\"conversation-turn-16\" data-scroll-anchor=\"false\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"aa8f78ec-ce18-4c71-bd95-d5d15661589b\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"81\" data-end=\"535\"><strong data-start=\"81\" data-end=\"535\">Ron Mukherjee est consultant en cybers\u00e9curit\u00e9 chez <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">ESET<\/span><\/span> Belgique &amp; Luxembourg, avec 28 ans d\u2019exp\u00e9rience en d\u00e9veloppement et management international, dont une sp\u00e9cialisation en cybers\u00e9curit\u00e9 et blockchain depuis 2016. Il est sp\u00e9cialis\u00e9 en confiance num\u00e9rique, renseignement sur les menaces, conformit\u00e9 europ\u00e9enne ainsi qu\u2019en s\u00e9curit\u00e9 cloud et IoT\/OT, et accompagne des organisations en Benelux et dans la r\u00e9gion DACH.<\/strong><\/p><p data-start=\"537\" data-end=\"937\" data-is-last-node=\"\" data-is-only-node=\"\">Lors de cette conf\u00e9rence, il abordera la volont\u00e9 de l\u2019Europe de renforcer sa souverainet\u00e9 num\u00e9rique dans un contexte de menaces en constante \u00e9volution. Il pr\u00e9sentera les analyses de threat intelligence d\u2019ESET pour la protection des secteurs critiques et reviendra sur des r\u00e9glementations cl\u00e9s de l\u2019UE comme NIS2 et DORA, sous l\u2019angle de la r\u00e9silience et de la conformit\u00e9 via des solutions XDR et MDR.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8594\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-8594\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">14h50-15h15 | Conf\u00e9rence de Julien Winkin (LUXGAP) : S\u00e9curiser gr\u00e2ce \u00e0 la conformit\u00e9 : quand la conformit\u00e9 devient un levier de r\u00e9silience cyber<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8594\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-8594\"><p>Venez assister \u00e0 l\u2019intervention de <strong>Julien Winkin<\/strong>, CEO de <strong>LUXGAP<\/strong>, expert reconnu en cybers\u00e9curit\u00e9 et conformit\u00e9 r\u00e9glementaire, \u00e9lu DPO of the Year 2023. Fort de plus de dix ans d\u2019exp\u00e9rience aupr\u00e8s d\u2019organisations publiques et priv\u00e9es, il expliquera comment la conformit\u00e9, trop souvent per\u00e7ue comme une simple contrainte documentaire, peut devenir un v\u00e9ritable levier de r\u00e9silience cyber. \u00c0 travers une approche concr\u00e8te m\u00ealant threat intelligence, analyse d\u2019empreinte num\u00e9rique et anticipation des signaux faibles, d\u00e9couvrez comment pr\u00e9venir les cyberattaques et renforcer efficacement la continuit\u00e9 des activit\u00e9s.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8595\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-8595\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">15h45-16h10 | Conf\u00e9rence de Toon Van den Bergh (OPENTEXT) Migration vers un cloud public ou souverain ? Gardez la ma\u00eetrise de vos donn\u00e9es !<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8595\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-8595\"><div class=\"flex flex-col text-sm\"><article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:cd42322c-4b0e-4bb5-9fe5-45d05d169112-9\" data-testid=\"conversation-turn-16\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"d22e18f1-eeb5-4df9-84f6-e6defe3ac083\" data-message-model-slug=\"gpt-5-2\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"0\" data-end=\"81\" data-is-last-node=\"\" data-is-only-node=\"\"><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Lors de cette intervention, <\/span><strong style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Toon Van den Bergh<\/strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">, Sr. Account Manager chez Opentext, \u00e9voquera comment s\u00e9curiser les donn\u00e9es dans le cloud public ou souverain gr\u00e2ce au chiffrement centr\u00e9 sur les donn\u00e9es, tout en pr\u00e9servant souverainet\u00e9 et conformit\u00e9.<\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/article><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8596\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-8596\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">16h10 - 16h 35 | Conf\u00e9rence de Gw\u00e9na\u00eblle Herv\u00e9 (Proximus NXT) : La souverainet\u00e9 num\u00e9rique est-elle la cl\u00e9 de l\u2019innovation, de la r\u00e9silience et du contr\u00f4le ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8596\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-8596\"><div class=\"text-base my-auto mx-auto [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"cfa58fe2-f38c-4fbd-8ac8-6cb692470411\" data-message-model-slug=\"gpt-5-3\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"50\" data-end=\"425\">Gw\u00e9na\u00eblle Herv\u00e9 pilote, \u00e0 l\u2019\u00e9chelle du Benelux, une mission visant \u00e0 d\u00e9finir l\u2019approche de cloud souverain de <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Proximus NXT<\/span><\/span>. Elle dirige une \u00e9quipe transverse interr\u00e9gionale et oriente les choix strat\u00e9giques, les investissements et le positionnement sur le march\u00e9 afin de renforcer le leadership de l\u2019entreprise en mati\u00e8re de souverainet\u00e9 num\u00e9rique.<\/p><p data-start=\"427\" data-end=\"598\">Lors de sa conf\u00e9rence, elle mettra l\u2019accent sur les principaux d\u00e9fis et opportunit\u00e9s li\u00e9s \u00e0 la souverainet\u00e9 num\u00e9rique dans un contexte international en rapide \u00e9volution.<\/p><p data-start=\"600\" data-end=\"946\">\u00c0 mesure que les dynamiques mondiales s\u2019intensifient, le besoin de contr\u00f4le, de confiance et d\u2019ind\u00e9pendance technologique devient crucial. Les gouvernements, les entreprises et les fournisseurs de technologies se positionnent tous sur ce terrain, soulevant une question centrale : comment s\u2019approprier efficacement la souverainet\u00e9 aujourd\u2019hui ?<\/p><p data-start=\"948\" data-end=\"1408\" data-is-last-node=\"\" data-is-only-node=\"\">Le march\u00e9 \u00e9volue \u00e0 grande vitesse, avec de nombreux acteurs proposant une gamme de solutions de plus en plus large, adapt\u00e9es \u00e0 des besoins vari\u00e9s. Gr\u00e2ce \u00e0 une approche agnostique et tourn\u00e9e vers l\u2019avenir, Proximus NXT combine des technologies performantes, des capacit\u00e9s d\u2019IA souveraine et des services d\u2019infrastructure s\u00e9curis\u00e9s. Cela permet aux organisations de faire de la souverainet\u00e9 un v\u00e9ritable levier d\u2019innovation, de r\u00e9silience et de confiance client.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8597\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-8597\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">16h35 - 17h | Conf\u00e9rence de Roy Coppieters (PwC) : De la pr\u00e9paration \u00e0 la r\u00e9silience : quand il pleut encore demain\u2026 <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8597\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-8597\"><p data-start=\"44\" data-end=\"435\">Cette session explore comment les organisations peuvent appliquer le concept de \u00ab minimum viable company \u00bb afin de maintenir l\u2019efficacit\u00e9 de leurs missions sous pression prolong\u00e9e. Nous examinerons des approches concr\u00e8tes pour renforcer la r\u00e9silience des fonctions essentielles et analyserons ce qui change lorsqu\u2019une situation d\u2019urgence temporaire devient la norme op\u00e9rationnelle durable.<\/p><p data-start=\"437\" data-end=\"599\" data-is-last-node=\"\" data-is-only-node=\"\">Les participants d\u00e9couvriront des cadres pratiques et des exemples concrets pour renforcer la performance organisationnelle dans des contextes de crise prolong\u00e9e.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8598\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-8598\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Table Ronde (17h-18h) :  BCC X Security \"Souverainet\u00e9 num\u00e9rique : rempart ou illusion dans un monde dystopique ?\"<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8598\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-8598\"><p class=\"isSelectedEnd\">Anim\u00e9e par\u00a0<strong>Christian de Boeck<\/strong>, cette table ronde mettra l\u2019accent sur les enjeux de\u00a0<strong>s\u00e9curit\u00e9<\/strong>\u00a0et de\u00a0<strong>business continuity<\/strong>\u00a0dans un environnement num\u00e9rique de plus en plus incertain.<\/p><p class=\"isSelectedEnd\">Les \u00e9changes porteront sur la mani\u00e8re dont les organisations peuvent renforcer leur r\u00e9silience face aux cybermenaces, p<\/p><p class=\"isSelectedEnd\">rot\u00e9ger leurs donn\u00e9es critiques et garantir la continuit\u00e9 de leurs activit\u00e9s en cas de crise, d\u2019attaque ou de d\u00e9faillance technologique.<\/p><p>La discussion interrogera enfin la\u00a0<strong>souverainet\u00e9 num\u00e9rique<\/strong>\u00a0comme levier strat\u00e9gique pour anticiper les risques, s\u00e9curiser les infrastructures essentielles et assurer la p\u00e9rennit\u00e9 des activit\u00e9s : constitue-t-elle aujourd\u2019hui un v\u00e9ritable rempart, ou une illusion face aux vuln\u00e9rabilit\u00e9s d\u2019un monde de plus en plus dystopique ?<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cea970d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cea970d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c1f79b\" data-id=\"6c1f79b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1becbb elementor-widget elementor-widget-spacer\" data-id=\"a1becbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3929fe elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a3929fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les interventions sur les data centers<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-348cb04 elementor-widget elementor-widget-spacer\" data-id=\"348cb04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a5a5b elementor-widget elementor-widget-heading\" data-id=\"71a5a5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pourquoi r\u00e9unir les experts du data center autour des enjeux de r\u00e9silience et de souverainet\u00e9 ?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1300bdc elementor-widget elementor-widget-text-editor\" data-id=\"1300bdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #808080;\">Dans un contexte marqu\u00e9 par la multiplication des cybermenaces, les exigences de continuit\u00e9 d\u2019activit\u00e9 et les enjeux croissants de souverainet\u00e9 num\u00e9rique, les infrastructures de donn\u00e9es deviennent un pilier strat\u00e9gique pour les organisations et les \u00c9tats. Les data centers ne sont plus seulement des infrastructures techniques : ils constituent d\u00e9sormais un \u00e9l\u00e9ment cl\u00e9 pour garantir la r\u00e9silience op\u00e9rationnelle, la ma\u00eetrise des donn\u00e9es et l\u2019autonomie technologique europ\u00e9enne, notamment dans le cadre des nouvelles exigences r\u00e9glementaires comme la directive NIS2<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12318b9 elementor-widget elementor-widget-text-editor\" data-id=\"12318b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #808080;\"><b>Cliquez sur chaque box du programme pour d\u00e9ployer son contenu et consulter les informations relatives aux conf\u00e9rences (programme en cours de remplissage).<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d111b4 elementor-widget elementor-widget-accordion\" data-id=\"0d111b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1371\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1371\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">13h30 - 14h | Keynote d'Olivier Labb\u00e9 : Construction de datacenters, le nouveau hotspot \u00e9conomique<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1371\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1371\"><div class=\"flex flex-col text-sm pb-25\"><section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:1eb00874-2d04-41d7-9865-4c846ce98dda-6\" data-testid=\"conversation-turn-6\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"237ab34c-5d2c-4b8a-accd-84f3071bd38b\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"0\" data-end=\"215\">Olivier Labb\u00e9, ancien cadre du secteur technologique, pilote aujourd\u2019hui le d\u00e9veloppement de datacenters en Europe et en Afrique via Via DC et BlueSun DC, en combinant vision strat\u00e9gique et expertise op\u00e9rationnelle.<\/p><p data-start=\"217\" data-end=\"455\" data-is-last-node=\"\" data-is-only-node=\"\">Avec l\u2019essor du cloud et de l\u2019intelligence artificielle, la demande en datacenters explose. Ces infrastructures, de l\u2019IA g\u00e9n\u00e9rative au edge computing, deviennent des moteurs cl\u00e9s de croissance et transforment profond\u00e9ment les territoires.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><p data-start=\"575\" data-end=\"870\" data-is-last-node=\"\" data-is-only-node=\"\">Lors de sa keynote, il pr\u00e9sentera les nouvelles opportunit\u00e9s li\u00e9es au d\u00e9veloppement des datacenters, expliquera comment les diff\u00e9rents acteurs structurent ce march\u00e9, et partagera des cl\u00e9s concr\u00e8tes pour tirer parti de ce secteur en plein essor au service du d\u00e9veloppement \u00e9conomique et r\u00e9gional.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1372\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1372\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">14h - 14h25 | Conf\u00e9rence de Xavier Warnier (DCX) : Quelle sera l\u2019importance des datacenters de proximit\u00e9 (edge) pour soutenir l\u2019innovation et r\u00e9pondre aux besoins num\u00e9riques croissants de demain ? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1372\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1372\"><p data-start=\"0\" data-end=\"347\">Cette conf\u00e9rence parlera des datacenters edge dans les villes de taille interm\u00e9diaire (Tier 2\/3), qui se trouvent aujourd\u2019hui \u00e0 un tournant. La demande pour des services \u00e0 faible latence augmente, mais des contraintes comme la rentabilit\u00e9, l\u2019acc\u00e8s \u00e0 l\u2019\u00e9nergie ou encore la densit\u00e9 des r\u00e9seaux restent en retrait par rapport aux grandes m\u00e9tropoles.<\/p><p data-start=\"349\" data-end=\"613\" data-is-last-node=\"\" data-is-only-node=\"\">L\u2019enjeu est donc de d\u00e9montrer un mod\u00e8le \u00e9conomique viable et scalable au-del\u00e0 des effets de mode, en adaptant les usages r\u00e9els aux bons territoires, en construisant des mod\u00e8les d\u2019exploitation efficaces et en tenant compte des contraintes locales et r\u00e9glementaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1373\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1373\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">14h25 - 14h50 | Conf\u00e9rence de Jean Paul Roseleer (R&M) : La couche physique ; comment prot\u00e9ger les infrastructures critiques de donn\u00e9es et de communication<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1373\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1373\"><p>Cette conf\u00e9rence abordera le r\u00f4le essentiel de la couche physique dans les infrastructures de donn\u00e9es et de communication, souvent n\u00e9glig\u00e9e mais pourtant d\u00e9terminante. Elle expliquera pourquoi la protection des \u00e9quipements, des c\u00e2bles et des installations est indispensable pour \u00e9viter les interruptions de service. \u00c0 travers des exemples concrets, elle montrera comment assurer la fiabilit\u00e9 des r\u00e9seaux, que ce soit dans un bureau, un datacenter ou \u00e0 l\u2019\u00e9chelle mondiale, afin de garantir des communications continues et s\u00e9curis\u00e9es.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1374\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1374\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">14h50 - 15h15 | Conf\u00e9rence de Charles Dehaeze (Straton DCIM) : Data center infrastructure management : from strategic vision to operational excellence<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1374\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1374\"><section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:9273887e-58f3-4190-b81d-58f64373bb13-3\" data-testid=\"conversation-turn-8\" data-scroll-anchor=\"false\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"bb54b0d2-0a4e-44e9-b89d-8a6b5108d30a\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"0\" data-end=\"331\">Cette session explore l\u2019int\u00e9gration concr\u00e8te du DCIM au sein des infrastructures critiques, en mettant l\u2019accent sur la n\u00e9cessit\u00e9 de faire le lien entre les \u00e9quipes facilities et les \u00e9quipes IT. Elle pr\u00e9sente une feuille de route \u00e9prouv\u00e9e pour un d\u00e9ploiement r\u00e9ussi, tout en tenant compte des contraintes op\u00e9rationnelles du terrain.<\/p><p data-start=\"333\" data-end=\"625\" data-is-last-node=\"\" data-is-only-node=\"\">Les participants d\u00e9couvriront comment mettre en place une gestion en temps r\u00e9el couvrant l\u2019ensemble des dimensions cl\u00e9s : les \u00e9quipements, la connectivit\u00e9, l\u2019alimentation, l\u2019environnement, les changements, la visualisation, l\u2019analyse, la planification des capacit\u00e9s, l\u2019\u00e9nergie et la s\u00e9curit\u00e9.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1375\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1375\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">17h - 18h | Table Ronde Data Center X IA: Les Hauts-de-France et la Belgique peuvent-ils devenir la capitale des datacenters IA en Europe ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1375\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1375\"><section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:0c10c988-3f1b-4bd3-80df-d3b6b10584d3-6\" data-testid=\"conversation-turn-14\" data-scroll-anchor=\"false\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"65ef07a1-1aab-4255-8a7a-434e92eecc10\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"0\" data-end=\"148\">Anim\u00e9e par <strong>Olivier Labb\u00e9<\/strong>, cette table ronde analysera le r\u00f4le strat\u00e9gique des Hauts-de-France et de la Belgique dans le d\u00e9veloppement des datacenters d\u00e9di\u00e9s \u00e0 l\u2019IA en Europe.<\/p><p data-start=\"150\" data-end=\"367\" data-is-last-node=\"\" data-is-only-node=\"\">\u00c0 travers une comparaison des approches fran\u00e7aise et belge, les intervenants discuteront des atouts, des d\u00e9fis et des opportunit\u00e9s pour positionner ces territoires comme des hubs majeurs de l\u2019infrastructure num\u00e9rique.<\/p><\/div><\/div><\/div><\/div><div class=\"mt-3 w-full empty:hidden\"><div class=\"text-center\">\u00a0<\/div><\/div><\/div><\/div><\/section><div class=\"pointer-events-none -mt-px h-px translate-y-[calc(var(--scroll-root-safe-area-inset-bottom)-14*var(--spacing))]\" aria-hidden=\"true\">\u00a0<\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fc1385a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fc1385a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d4a4d8\" data-id=\"0d4a4d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ed6734 elementor-widget elementor-widget-spacer\" data-id=\"4ed6734\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5c1289 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d5c1289\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les interventions sur la continuit\u00e9 d'activit\u00e9<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a1bd50 elementor-widget elementor-widget-spacer\" data-id=\"0a1bd50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b36db87 elementor-widget elementor-widget-heading\" data-id=\"b36db87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pourquoi r\u00e9unir les experts du business continuity autour des enjeux de r\u00e9silience et de souverainet\u00e9 ?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af29b17 elementor-widget elementor-widget-text-editor\" data-id=\"af29b17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans un contexte marqu\u00e9 par la multiplication des cyberattaques, les risques de perturbation majeurs et l\u2019\u00e9volution du cadre r\u00e9glementaire europ\u00e9en, la continuit\u00e9 d\u2019activit\u00e9 devient un \u00e9l\u00e9ment central de la r\u00e9silience des organisations. La directive NIS2 \u00e9largit notamment les obligations des entit\u00e9s critiques en mati\u00e8re de gestion des risques, de gouvernance et de r\u00e9ponse aux incidents. R\u00e9unir les experts de la <em data-start=\"527\" data-end=\"548\">business continuity<\/em> permet ainsi d\u2019analyser ces \u00e9volutions, de partager des retours d\u2019exp\u00e9rience et d\u2019identifier les strat\u00e9gies permettant aux organisations de maintenir leurs op\u00e9rations, de se r\u00e9tablir rapidement et de renforcer leur capacit\u00e9 d\u2019adaptation face aux crises.<\/p>\n<p><span style=\"text-decoration: underline;\">Pour vous donner une id\u00e9e des th\u00e8mes explor\u00e9s lors des conf\u00e9rences :<\/span><\/p>\n<ol start=\"1\" type=\"1\">\n<li data-olk-copy-source=\"MessageBody\">Sovereignty, Geopolitics and Continuity Strategy<\/li>\n<li>Meeting Legal and Regulatory resilience requirements<\/li>\n<li>Integrating ESG in continuity management<\/li>\n<li>Infrastructure Resilience<\/li>\n<li>Applications and Data Continuity: Backup and Disaster Recovery (DRP) for Cyber Resilience<\/li>\n<li>Supply chain, Logistics and Third-Party Resilience<\/li>\n<li>Crisis Management and Communication<\/li>\n<li>Effective Testing, Reporting and Continuous Improvement<\/li>\n<\/ol>\n<div><br><\/div>\n<div><b>Cliquez sur chaque box du programme pour d\u00e9ployer son contenu et consulter les informations relatives aux conf\u00e9rences (programme en cours de remplissage).<\/b><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2bea89 elementor-widget elementor-widget-accordion\" data-id=\"e2bea89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2371\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2371\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">15h45 - 16h10 | Keynote de Gregory Descamps & Christian De Boeck  : La continuit\u00e9 dans un monde fragment\u00e9 : souverainet\u00e9, s\u00e9curit\u00e9 et menaces \u00e9mergentes<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2371\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2371\"><p>Dans un monde o\u00f9 les r\u00e9glementations, les menaces et les r\u00e9alit\u00e9s g\u00e9opolitiques \u00e9voluent plus rapidement que la capacit\u00e9 d\u2019adaptation des organisations, la continuit\u00e9 n\u2019est plus une discipline statique. Cette keynote explore la mani\u00e8re dont la souverainet\u00e9, les technologies \u00e9mergentes (informatique quantique, intelligence artificielle, etc.) ainsi que les r\u00e9glementations en mati\u00e8re de (cyber)s\u00e9curit\u00e9 (CER, NIS2, CRA, DORA, \u2026) contribuent \u00e0 un paysage de menaces de plus en plus fragment\u00e9, red\u00e9finissant la continuit\u00e9 d\u2019activit\u00e9 et la r\u00e9silience op\u00e9rationnelle. Elle abordera \u00e9galement la fa\u00e7on de donner du sens \u00e0 une disruption permanente, de hi\u00e9rarchiser ce qui compte r\u00e9ellement, et d\u2019identifier les priorit\u00e9s sur lesquelles les dirigeants doivent concentrer leur attention pour rester r\u00e9silients et garder le contr\u00f4le.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2372\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2372\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">16h 10 - 16h35 | Conf\u00e9rence de Fabien B\u00e9n\u00e9teau (F24) : La r\u00e9silience se brise d\u2019abord dans les esprits : trois changements de mentalit\u00e9 que votre organisation ne doit pas ignorer.<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2372\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2372\"><p class=\"isSelectedEnd\">De nombreuses organisations se disent \u00ab r\u00e9silientes \u00bb, mais leur culture s\u2019effondre souvent sous une pression r\u00e9elle. Cette session met en lumi\u00e8re les probl\u00e8mes de mentalit\u00e9, souvent invisibles, qui fragilisent silencieusement la pr\u00e9paration et la prise de d\u00e9cision.<\/p><p class=\"isSelectedEnd\">\u00c0 travers trois enseignements clairs et parfois surprenants, nous expliquerons comment d\u00e9velopper un \u00e9tat d\u2019esprit capable de r\u00e9agir avec plus d\u2019intelligence, de s\u2019adapter plus rapidement et d\u2019\u00e9viter cette fausse confiance qui met les organisations en danger.<\/p><p>Attendez-vous \u00e0 quelques v\u00e9rit\u00e9s inconfortables, mais aussi \u00e0 des solutions concr\u00e8tes et directement applicables.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2373\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2373\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">16h35 - 17h | Conf\u00e9rence de Christian De Boeck (SYNERGIT) : Construire la r\u00e9silience organisationnelle en utilisant les crit\u00e8res ESG comme un bouclier strat\u00e9gique<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2373\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2373\"><p data-start=\"0\" data-end=\"187\">\u00c0 l\u2019\u00e8re des crises multiples \u2014 entre bouleversements g\u00e9opolitiques, instabilit\u00e9 climatique et tensions sociales \u2014 les strat\u00e9gies traditionnelles et les plans de reprise ne suffisent plus.<\/p><p data-start=\"189\" data-end=\"591\" data-is-last-node=\"\" data-is-only-node=\"\">Cette session explore comment les crit\u00e8res ESG (environnementaux, sociaux et de gouvernance) offrent un cadre solide pour renforcer la r\u00e9silience et la souverainet\u00e9 des organisations. Nous verrons en quoi int\u00e9grer la durabilit\u00e9 et des objectifs sociaux au c\u0153ur de leur identit\u00e9 permet aux organisations de d\u00e9velopper l\u2019agilit\u00e9 n\u00e9cessaire pour surmonter les d\u00e9fis et assurer leur p\u00e9rennit\u00e9 \u00e0 long terme.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2374\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2374\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">17h - 18h | Table Ronde BCC X Security : Souverainet\u00e9 num\u00e9rique : rempart ou illusion dans un monde dystopique ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2374\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2374\"><p class=\"isSelectedEnd\">Anim\u00e9e par <strong>Christian de Boeck<\/strong>, cette table ronde mettra l\u2019accent sur les enjeux de <strong>s\u00e9curit\u00e9<\/strong> et de <strong>business continuity<\/strong> dans un environnement num\u00e9rique de plus en plus incertain.<\/p><p class=\"isSelectedEnd\">Les \u00e9changes porteront sur la mani\u00e8re dont les organisations peuvent renforcer leur r\u00e9silience face aux cybermenaces, prot\u00e9ger leurs donn\u00e9es critiques et garantir la continuit\u00e9 de leurs activit\u00e9s en cas de crise, d\u2019attaque ou de d\u00e9faillance technologique.<\/p><p>La discussion interrogera enfin la <strong>souverainet\u00e9 num\u00e9rique<\/strong> comme levier strat\u00e9gique pour anticiper les risques, s\u00e9curiser les infrastructures essentielles et assurer la p\u00e9rennit\u00e9 des activit\u00e9s : constitue-t-elle aujourd\u2019hui un v\u00e9ritable rempart, ou une illusion face aux vuln\u00e9rabilit\u00e9s d\u2019un monde de plus en plus dystopique ?<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f99a589 elementor-widget elementor-widget-spacer\" data-id=\"f99a589\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd3f5cc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd3f5cc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-16d97f9\" data-id=\"16d97f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba2c12e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ba2c12e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/industrial-cybersec.com\/communique-de-presse\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Communiqu\u00e9 de presse<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-99d569f\" data-id=\"99d569f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-655e645 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"655e645\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/www.eventbrite.fr\/e\/1979998874935?aff=oddtdtcreator\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inscriptions<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ebdbcc0\" data-id=\"ebdbcc0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-523adba elementor-align-center elementor-widget elementor-widget-button\" data-id=\"523adba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/industrial-cybersec.com\/contact\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nous contacter<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07a4aeb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07a4aeb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7803af3\" data-id=\"7803af3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43657d6 elementor-widget elementor-widget-spacer\" data-id=\"43657d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>D\u00e9couvrez le programme de la journ\u00e9e ! Quand ? Le 28 avril 2026 O\u00f9 ? Au Sheraton Brussels Airport Hotel (Zaventem\/Bruxelles) Vos temps de pause\/ networking : Caf\u00e9 d&rsquo;Accueil (13h-13h30) Accueil des visiteurs au Sheraton Brussels Airport Hotel. Pause Caf\u00e9 &#038; Networking (15h15-15h45) C\u2019est le moment d\u2019\u00e9changer autour d\u2019un caf\u00e9, d&rsquo;aller \u00e0 la rencontre des [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4153","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/4153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/comments?post=4153"}],"version-history":[{"count":40,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/4153\/revisions"}],"predecessor-version":[{"id":4248,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/4153\/revisions\/4248"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/media?parent=4153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}