10h20
Official opening of the Forum
Head of Information Systems Division, Ministry of Industry, Trade, Investment and the Digital Economy
Vice-Chairman of Club-DSI Côte d'Ivoire
President, Club Des DSI Senegal
Chairman of Club-DSI Tunisia
10h40
Digitalisation: what impact on cyber security?
Artificial Intelligence, Behavioural Analysis, Big Data and Analytics, Machine Learning. Technologies that will enable us to address cyber security or marketing issues? What can we expect from these technologies at a time when organisations are having to manage the digitisation of their services and the deployment of new technologies such as IoT and RPA? How can we navigate safely through these oceans of data and objects?
In this talk, we will review the promises and realities of these technologies and the day-to-day consequences for those involved in security.
Managing Partner EXCELLIUM SERVICES
11h00
Artificial intelligence or the real breakthrough in cyber security.
In a constantly evolving environment where threats are becoming increasingly complex, the amount of data to be processed by security analysts is becoming immense. The mutation of known attacks and numerous unknown threats, such as zero-days, underline the limits of traditional tools and rules-based detection. While it is now almost standard practice to deal with attacks that have already been identified and prevent them from happening again, how can we do the same when faced with threats that do not yet exist? This is what Machine Learning, or more generally Artificial Intelligence, will attempt to answer. How AI can be used to predict human behaviour
CEO LMPS GROUP
11h20
Building a cyber defence ecosystem to combat new threats
2017 was a pivotal year in which there was a real realisation of our dependence on digital technology, with a new type of ransomware spreading like a veritable pandemic that has taken its toll on major multinationals. These new threats, a tightening regulatory environment and the growing interconnection of our infrastructures mean that we need a new approach to cybersecurity. Orange's approach: building a cyber defence ecosystem to combat the new threats.
Key Account Sales Manager - ORANGE CYBERDEFENSE
11h40
At the Edge of Prediction: A Look Back to the Future of Cybersecurity
The world is evolving at an unprecedented pace, generating huge opportunities. But with this progress we run many risks, and understanding them and analysing, quantifying, and also sharing effectively and at the right time the study of past threats, are the main keys to improving our cyber defences and embracing the innovations and progress of today and tomorrow. Join us on an inspiring journey through the forces shaping our increasingly interconnected world.
Security Strategist - AGC SYMANTEC
12h00
Security for the public Cloud and the Datacenter; the case of a telecoms operator
Data security is a crucial issue for businesses.
Whether data is stored in a public or private cloud, on the customer's site or in a data centre, it must be protected against cyber-attacks.
What role should an operator play in strengthening the security of hosted data without compromising the performance of applications and software in production? This is the complex question to which we propose to provide some answers.
Director of ICT, INWI Business
13h00
DSI Round Table
How can we achieve the dual objective of providing innovative digital services while ensuring quality and compliance with safety standards?
CIO Alliances Real Estate Morocco
Expert DENYALL
IT Security Manager Ministry of National Education Morocco
Executive Director of Security Tunisie Telecom
IT Department Ministry of Justice Ivory Coast
D.S.I at the Emir Abdelkader University in Constantine
ARBOR NETWORKS expert
17h20
Cybercrime - A Middle East And North Africa Perspective
This session will explore the cybercrime ecosystem in this region and beyond, and the landscape of threats that can target MENA organisations, large and small, in the private or public sector.
AMEA Technical Executive TREND MICRO
17h40
Stepping Up to Generation 5 of Cyber Security
Summary of the topic " 2017 was a global wake-up call to get serious about addressing the cyber threat landscape. Unprecedented levels of cyber-attacks played out as large-scale , multi-vector mega attacks that inflicted major damage on business and reputation. As a result we find ourselves in the midst of the fifth generation of cyber-attacks. To remain operationally secure now , businesses require a new generation of cyber security: Generation 5.
Strategic Alliance Manager CHECK POINT
18h00
Adopting a people-centred cyber security strategy to deal with the changing cyber threat landscape
Advanced attacks are now aimed more at exploiting weaknesses inherent in human nature than system flaws. Cybercriminals have moved away from automated attacks and exploit kits towards social engineering and identity theft. This change of direction has increased the impact and effectiveness of their campaigns. They have perfected their techniques, adapting them to Cloud applications such as O365 and adopting new ones: password theft, ransomware, president fraud, and so on. They now use modern communication channels: email, the web and social networks to achieve their ends. In this presentation, we will discuss the latest trends used by hackers to infect users and penetrate companies. We will also cover the best practices (email authentication, training, security tools, etc.) to adopt to protect your users, your data, your brand and your company.
Sales Engineering Manager, Southern Europe PROOFPOINT, Inc
18h20
How can you guarantee the security of mobile devices?
Demonstration of advanced intrusions on mobile phones and how to protect yourself.
Security Expert, 42 CONSULTING Morocco
19h00
Learn to recognise and defend against DDOS & Advanced Threats
"Know your enemy and know yourself, even if you have to fight a hundred wars, a hundred times you will be victorious (Article 3) - The art of war - Sun Tzu.
DDoS attacks now take many forms. Knowing your environment, the different types of attack and how to protect against them are the keys to effective defence. In this workshop, you will learn how to identify and model your services, identify the different types of attack and put in place effective protection. Based on real-life cases simulated during the workshop, you will experience the handling of different types of attack in real time, as if you were there.
Cyber security consultant and expert ARBOR NETWORKS
09h20
Trust does not exclude control
Privileged access to the information system has always been the Achilles heel of many organisations. It is difficult for an IT manager to control who does what on their information system and to ensure the total security of accounts with powers held by administrators, partners or suppliers. It is now essential to track the actions of all authorised users so that suspicious behaviour can be identified in real time and malicious acts contained, but also to comply with the directives issued by the various national cybersecurity agencies.
SYSTANCIA expert
09h40
Rethinking Crypto: The Art off Protecting Data
Discuss holistic data protection techniques including encryption, tokenization and key management; trends and security drivers such as breaches, compliance and regulations such as GDPR.
Product Management THALES E-Security
Well-known figure in the encryption world as speaker and technology evangelist with over 20 years' experience
10h00
The impact of the RGPD on subcontractors and its implementation
The General Regulation on the Protection of Personal Data will come into force on 25 May. Although developed by the European Union, this regulation has an impact on many international companies, including those in Morocco.
In this presentation, we will explain to what extent and why the regulation has an impact on Moroccan companies.
We will then focus on the implementation of the RGPD and the key stages of compliance.
Chief Executive Officer HTS EXPERT CONSULTING Morocco
10h20
How to ensure complete recovery of your data
Whatever the sector or company, cyber attacks are on the rise. The number of data breaches is increasing dramatically. Once a company has been infiltrated, its data is usually compromised within days, if not hours. It is unlikely that the breach will be discovered in that time. This inability to detect an intruder means that hackers can not only disclose the company's confidential information, but also destroy its strategic data. The move towards publicly accessible IT infrastructures is exposing businesses even more. In the face of these increasingly sophisticated cyber threats, it is essential to take the necessary precautions with the latest lines of defence so that data can be restored in an isolated and serene manner.
Regional Sales Manager Levant & Emerging Africa DELL EMC
Christophe is the Co-Founder and Managing Director of Excellium Services. He is also the CTO of Excellium Security, the new Moroccan entity of the MED-TECH Group, with which Excellium has formed a technological partnership. Prior to joining Excellium, Christophe was Vice President and General Manager for the Europe, Middle East & Africa region at Qualys.com.
Managing Partner EXCELLIUM SERVICES
Jonathan BOURGAIN is an expert consultant at Arbor Networks in the field of network security for operators and enterprises, with a particular focus on protection against distributed denial-of-service attacks (DDoS) and advanced threats (Advanced Threat). Jonathan BOURGAIN has been advising operators and companies in various sectors in France and NA for many years.
Cyber security consultant and expert ARBOR NETWORKS
Graduate of the Master CRYPTIS, Computer Security and Cryptology, from the Faculty of Science and Technology at the University of Limoges (France).
Thomas Caplin began his career at SOGETI/ESEC's IT security R&D laboratory in Paris in 2010, where he developed cutting-edge technical expertise in IT security.
Later, in 2014, he joined the INGENICO group to specialise in electronic payments while contributing his security expertise on a daily basis, in a company where security is at the heart of its DNA through its leadership and activities in the world of electronic payments.
Keen to expand his activities, he joined HTS Expert Consulting in Paris in 2017 and became a PCI QSA auditor.
Driven by the desire to develop HTS Expert Consulting's activities in Africa, and particularly in Morocco where electronic payment is booming, he set up the HTS Morocco subsidiary in Casablanca and took over its management.
Chief Executive Officer HTS EXPERT CONSULTING Morocco
Emmanuel CHERIET completed his studies at the Ecole Supérieure de Commerce in Toulouse with an internship in Casablanca with the consulting firm Valyans (formerly New.e.com Ersnt & Young).
He then began his career with a telecoms operator (Colt Telecom), before moving into IT solutions integration (Security, Networks, Telephony) with SPIE and TELINDUS (SFR Group).
After 11 years in this field, Emmanuel decided to specialise in cybersecurity by joining LEXSI (France's leading independent audit, consultancy and CERT company).
Emmanuel CHERIET has held the position of Key Account Sales Director at Orange Cyberdefense since 2016.
Key Account Sales Manager - ORANGE CYBERDEFENSE
As Technical Leader for AMEA (Asia Pacific, Mediterranean, Middle East and Africa), Cherif Djerboua acts as the CTO for the region, focusing on technical strategy, innovation and quality assurance.
Cherif joined Trend Micro in the early part of 2017 from Microsoft, where he held numerous consulting, program management and leadership roles. During his 26+ years' career, he engaged with customers and partners worldwide, including dozens of Fortune 500 companies, to set vision, strategy and execution to achieve business transformation. Cherif recently relocated from Ottawa, Canada to Dubai, UAE. He holds a Masters in Chemical Engineering and a Bachelor in Environmental Engineering from the University of Constantine and holds several industry certifications.
AMEA Technical Executive TREND MICRO
Issam El Haddioui, Security Strategist - AGC at Symantec. He has over 15 years' experience in cyber security. Over the course of his career, he has worked closely with key accounts in a variety of sectors, including telecoms operators, financial institutions and public organisations, and has held technical and services management positions worldwide at security vendors and manufacturers. He is an electronics and telecommunications engineer, and holds several certifications
Security Strategist - AGC SYMANTEC
Business Development Manager for Systancia France - International
More than 15 years' experience in sales management in high-tech companies (publisher of virtualisation and IT service management solutions - manufacturer of medical imaging equipment).
SYSTANCIA expert
A graduate of the Rabat Ecole des Mines and Télécom SudParis, Amine Hilmi gained 10 years' experience in Parisian consultancy firms. On his return to Morocco, he held the position of IT Manager at inwi, before joining Devoteam as Principal Manager and then taking charge of Devoteam Solutions Africa, before joining LMPS Group.
CEO LMPS GROUP
A graduate of EPITA (France) in Network Systems and Security, Nawfel LAHRICHI is passionate about IT and cybercrime in particular. Over the years, he has developed solid expertise in intrusion testing and vulnerability exploitation.
Security Expert, 42 CONSULTING Morocco
With 20 years' experience in telecommunications, Khalid Lamkinsi successively held the positions of Marketing Manager, SME Market Director and Business Development Director at Wana, which became inwi in 2010. Currently Director of ICT offerings, he is responsible for developing security and cloud offerings within the inwi Business Enterprise branch. He holds an INPT engineering degree and an MBA from HEC University in Montreal.
Director of ICT, INWI Business
Slam LAQTIB is a Well-known figure in the encryption world as speaker and technology evangelist with over 20 years' experience
Product Management THALES E-Security
Hand-picked at the age of 17 by Gil Shwed himself. Razi has enjoyed a meteoric rise through the ranks of the world leader in IT security. He is now the youngest Strategic Alliance Manager at Check Point leading the success of the top customers with the highest revenue worldwide.
Strategic Alliance Manager CHECK POINT
Head of the pre-sales team at Proofpoint for Southern Europe and Benelux, Charles Rami has been working in the field of IT security for some fifteen years. He was previously a member of Cisco's security teams, after spending several years working for security solution distributors, where he collaborated with companies such as Checkpoint, Ironport, AcitvIdentity, Fortinet and F5.
Mr. Rami holds an engineering degree from EPITA: Ecole d'Ingénieurs en Informatique en île-de-france.
Sales Engineering Manager, Southern Europe PROOFPOINT, Inc
Regional Sales Manager Levant & Emerging Africa DELL EMC