Official Opening Forum
17h30
Cybersecurity: Major E&Y trends
—
18h30
DATAPROTECT
A study published by Dataprotect of 148 banks in the Uemoa zone and in three Central African countries reveals that 85% of banks have already been the victims of one or more cyber attacks.
11h30
From cyber security to cyber immunity
The rapid proliferation of the Internet of Things is making our daily lives extraordinarily easier. It makes connectivity a key driver of infinite opportunities, but also of serious vulnerabilities for critical infrastructures and the industrial sector. Connected devices are no longer just assistants in our daily lives, they are also dangerous vectors for hacking. Eugene Kaspersky, the man behind cyber security, is calling for a revolution in the industry. He is certain that there is a long-standing need to move on from the concept of 'cybersecurity' to that of 'cyber-immunity'. During his talk, he will explain how this is possible and show what role his company is playing in this decisive development.
Co-founder and Chief Executive Officer of KASPERSKY LAB
12h00
Offensive AI vs defensive AI: The battle of the algorithms
Amongst rapidly evolving technological advances, the emergence of AI-enhanced malware is making cyber attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see AI-powered cyber attacks exploited on a large scale. To protect against offensive AI attacks, organisations are turning to defensive cyber AI, which can identify and neutralise emerging malicious activity wherever and whenever it occurs.
12h30
Security, a challenge for blockchain
The security of blockchains is based on advanced cryptographic mechanisms and mathematical models of behaviour and decision-making. Although this theoretically prevents the duplication or destruction of the digital assets that make them up, poor management of portfolios and cryptographic keys presents a major threat to users of this technology. What is the difference between public and private blockchain? What are the real opportunities offered by this technology? What security measures should be taken when using blockchain? Does the advent of the quantum computer jeopardise the future of blockchain?
15h00
The CISO: Responsible yes...but up to what point?
The CISO is the guarantor of security, but to what level is he responsible?
The CISO is now a key position. Much more than a security technician,
it is responsible for choosing and implementing the company's security policy.
This round-table discussion will look at the role, remit and position of the CISO in the organisation chart, and how this role has evolved given the growing importance of IS security.
What are the CISO's current responsibilities at company level, and what are the consequences of their actions, particularly in legal terms?
Moderator
Chairman of the African Cybersecurity Centre
Testimonials and feedback
Chief Information Security Officer at WAFA ASSURANCE
RSSI Ministry of Solidarity and Women, the Family and Social Development
15h30
TREND MICRO
—
16h00
Zero Trust? How to combine the human factor with effective cyber security
We believe that combining people with technology remains the cornerstone of a successful cyber security strategy. Yet when you consider the damage that can be caused when sensitive assets are accessed without an access policy and without monitoring, you might be tempted to apply the Zero Trust principle strictly. So what approach should we adopt when examples of internal and external attacks are multiplying? In this workshop, we'll give you the keys to finding the best compromise between enhanced security and an optimal user experience, by prioritising management of privileged access, endpoint security and identity management. Simple methods, illustrated by recent case studies.
16h30
Detecting the most complex cyber attacks thanks to AI
Thales Cybels Analytics, an innovative platform based on advanced Artificial Intelligence and Big Analytics technologies.
This platform enables finer, more exhaustive and faster detection of the most complex attacks, in real time and (cold).
It adapts to the needs of the most demanding customers, offering a simple and unique tool that enables each user in particular to
adapt AI algorithms to suit its business context.
17h00
Cybersecurity threat intelligence and data leak detection
Do you have total control over your company's sensitive & critical data? Do you have a complete overview of its exposure on the different layers of the Internet? With over 90% of critical data leaks occurring on connected storage devices belonging to ecosystems close to companies, CybelAngel gives you back control over your critical information. By scanning the visible, deep & dark web as well as all the connected storage devices on the planet, in the cloud or not, we provide you with personalised and qualified alerts on data leaks concerning you and we enable you to improve the global security of your organisation.
09h20
Bug Bounty: Wake up your inner hacker
Increasingly popular with IT teams keen to improve their security levels, bug bounty is emerging as an essential tool. Aimed at facilitating the identification and management of vulnerabilities by drawing on a community of elite hackers, bug bounty must be well organised. Whether it's used to test websites or online applications, or to test systems in the pre-production phase in a digital factory, any programme requires you to ask yourself the right questions.
CEO & Co Founder YOGOSHA
12h30
IT/OT convergence, a major strategic challenge for industrial groups
The emergence of "Industry 4.0" is a reality: many sectors have already launched major transformation projects. So it's time for industrial groups to take the plunge and start preparing for the transition now, in particular by converging industrial information systems (IIS) / Operation Technology (OT) and enterprise information systems (EIS) / Information Technology (IT). Such a strategy brings with it new challenges in terms of controlling the assets of connected industrial equipment, the cyber-security of this equipment, and data enhancement. The success of this convergence, at the heart of the CIO's mission, will determine the transformation of the industrial world in the years to come.
15h00
Cybersecurity: should you outsource your SOC?
—
16h00
INWI
—
16h30
How can you reduce your Cyber Risk in the modern era of Cyber Exposure?
Cyber Exposure is a new discipline for measuring and managing cyber security risks in the digital age. Cyber Exposure takes security from a static, siloed view of cyber risks to a holistic, dynamic view of the entire modern attack surface. Cyber Exposure translates vulnerability data into actionable intelligence to help security teams prioritise and target remediation based on business risk.
Cyber Security Consultant TENABLE
17h00
ATEMPO
—
Hatim Ahmitach is a Cyber Security Consultant with 14 years' experience in Cyber Security, Network Security and Modern Technologies.
Cyber Security Consultant TENABLE
Pierre Cabannes is in charge of international operations at CybelAngel, a French start-up specialising in data leak detection. With 10 years' experience in the world of data for major companies, from Microsoft to Sinequa via Jive Software, Pierre Cabannes brings key expertise to bear on your major projects.
CYBELANGEL Expert
Paul Chammas is Senior Manager IT Risk and Cybersecurity with over 10 years' experience in the financial sector. With Unleash Consulting, he created CLARICE, an innovative platform for managing technological risks. He is currently on assignment as CISO at Coinhouse, France's leading cryptocurrency exchange and digital asset management consultancy.
Senior Manager IT Risk and Cybersecurity UNLEASH CONSULTING
Loubna has several years' experience in IT security and telecoms. In 2012, she joined WALLIX as a pre-sales representative in charge of international sales. This position enabled her to develop her versatility and build up a substantial network of contacts. At the same time, she became interested in business development. Since 2017, her role as Maghreb Business Manager has been to build and consolidate WALLIX's presence on the Maghreb market.
Maghreb Business Manager WALLIX
Eugene is a world-renowned cybersecurity expert and successful entrepreneur. He is co-founder and CEO of Kaspersky, the world's largest privately held provider of endpoint protection and cybersecurity solutions.
Eugene began his career in cyber security by accident when his computer was infected with the "Cascade" virus in 1989. Eugene's specialist training in cryptography helped him to analyse the encrypted virus, understand its behaviour and then develop a removal tool for it. After successfully removing the virus, Eugene's curiosity and passion for computer technology led him to start analysing more malicious programs and developing disinfection modules. This exotic collection of antivirus modules would eventually become the foundation of Kaspersky's antivirus database. Today, the database is one of the most comprehensive in cybersecurity, used to detect and prevent systems from being infected by over 500 million malicious programs.
Continuing his passion for defensive technologies, in 1990 Eugene began assembling a team of like-minded, passionate researchers to create the AVP Toolkit Pro antivirus program, which four years later was recognised by the University of Hamburg as the world's most effective antivirus software.
Wishing to combine their successful experience in anti-virus programming with their entrepreneurial vision, Eugene and his colleagues decided to set up their own independent company. In 1997, Kaspersky was founded and Eugene led the company's antivirus research. In 2007, he was appointed CEO of Kaspersky.
Today, Kaspersky is one of the world's fastest-growing IT security providers, operating in almost 200 countries and territories worldwide. The company employs more than 4,000 IT security professionals and specialists in 35 dedicated regional offices in 31 countries, and its cybersecurity technologies protect more than 400 million users worldwide.
Kaspersky's world-renowned team of experts has investigated some of the most complex and sophisticated cyber attacks ever known, including Stuxnet, Flame and Red October. The company also cooperates extensively with INTERPOL, Europol and national police forces to actively assist them in their fight against cybercrime.
Eugene holds an Honorary Doctorate of Science from the UK's University of Plymouth. He regularly lectures on cyber security at universities around the world and speaks at leading industry conferences and events.
Eugene is both a keen traveller and a passionate advocate of wilderness and adventure tourism. He is also a talented photographer, which helps him to chronicle his prolific exploits in his blog - from polar expeditions and glacier crossings to volcano climbing and jungle trekking.
Co-founder and Chief Executive Officer of KASPERSKY LAB
Passionate about cybersecurity and entrepreneurship, Yassir Kazar set up his first start-up when he was finishing his studies. He subsequently pursued a career in IT services, becoming a staff manager in Business Intelligence at CGI, while also teaching security at university and engineering schools. In 2015, he founded Yogosha with Kévin Liagre, a private bug bounty platform based in the EMEA region.
CEO & Co Founder YOGOSHA