A01
Cloud computing : what will change with GDPR
A02
How International Cooperation can deal with Ransomware
A03
How to link SOCS and Crisis Management
A04
Agora Parlementaire
A05
Business Continuity Plans (BCPs) and Business Recovery Plans (BRPs) put to the test
A06
How do we harmonize our certification outlines to reconcile different requirement levels
A07
Cyber Threats Intelligence : what is its real added value ?
A08
Security by design, a new commercial and industrial imperative
A09
Should hack back be authorized for private corporations
A10
Cyber-Jihadism : public/private cooperation put to the test
A11
KYC and cyber security should clients, partners and providers now be assessed
A12
CTI how far can we go back up the «cyber kill chain»
A13
Wanacry and NotPetya feedback
A14
Darknets and Darknauts
A15
GDPR : Instructions for Compliance
A16
How to outsource your SOC
A17
Which dashboards to address your executive committee
A18
Capacity building international cooperation put to the test
A19
The NIS and critical infrastructure : how to ensure compliance
A20
Are connected objects the « Weakest Links » of cyber resilience ?
A21
The possibility of safe and secure smart cities
A22
Should we fear the balkanization of the internet
A23
WHICH INNOVATIVE APPROACHES FOR A ROBUST SOC-BASED CYBERDEFENSE
A24
Digital Life : Local Authorities on the front line
A25
TRAINING AND PRACTICE: HOW TO DEVELOP AND MAINTAIN KNOW-HOW AND INTERPERSONAL SKILLS
A26
Using Agile Security with Red Teaming and Bug Bounty
A27
DevOps : Can we reconcile security and speed ?
A28
CTI : how do we make it operational ?
A29
Digital Identity : how do we share roles ?
A30
PhilosoFIC : Predictive Algorithms
C04
AIRBUS -THREAT INTELLIGENCE ET REVERSE, CONNAISSANCE ET SUIVI DE LA MENACE
C06
ENGIE INEO: RETEX OF INDUSTRIAL IS AUDITS ON THE 3S MODEL: SENSITIZING, SECURING, SUPERVISING
C13
KASPERKSY LAB - LA THREAT INTELLIGENCE À L’HEURE DE L’INCERTITUDE
C14
Microsoft: Cloud et chiffrement, amis ou ennemis ?
C15
SOGETI -GESTION DES COMPTES À PRIVILÈGES, ACCÉLÉRATEUR DE LA SÉCURITÉ DANS LA TRANSFORMATION DIGITALE
C17
AMAZON WEB SERVICES : CLOUD SECURITY AT AWS IS THE HIGHEST PRIORITY. LEARN HOW TO PROTECT YOUR DATA WITH CLOUD-POWERED SECURITY
MC07
RATIONALITY, NUDGES & CYBERSECURITY
MC08
DETECTION IS DEAD
MC11
LA PROCÉDURE PÉNALE FACE AUX ÉVOLUTIONS DE LA CYBERCRIMINALITÉ ET DU TRAITEMENT DE LA PREUVE NUMÉRIQUE, PROPOSITIONS POUR UNE EFFICACITÉ JURIDIQUE RENFORCÉE DE LA LUTTE CONTRE LA CYBERCRIMINALITÉ
MC12
THE UNTOLD STORY ABOUT THREAT INTELLIGENCE: HOW MISP BECAME A SIGNIFICANT OPEN SOURCE THREAT INTELLIGENCE PLATFORM AND OPEN STANDARDS FOR INFORMATION SHARING
P04