by jlevrat | Jul 30, 2025
Testing an application, developing a new service, exploiting data in BI or entrusting a project to a service provider… In a context of increasing cyberattacks and stricter regulations such as GDPR, DORA and NIS2, anonymisation is emerging as a key response to...
by jlevrat | Jul 30, 2025
With the proliferation of domain names, the growing adoption of the cloud, SaaS and mobile applications, and the practice of shadow IT, organisations’ external attack surface is constantly growing, often faster than their ability to secure it. How can you...
by jlevrat | Jul 30, 2025
Long-life devices face a double threat: software erosion and evolving hardware platforms. Quick fixes and outdated architectures make products vulnerable, difficult to maintain, and impossible to upgrade safely. But hardware migration isn’t just a...
by jlevrat | Jul 22, 2025
Generative artificial intelligence is revolutionising the way we work, but it also raises new challenges in terms of security and data protection. This workshop will shed light on the emerging risks associated with the use of AI, as well as concrete levers to address...
by jlevrat | Jul 22, 2025
In a cloud-based and distributed world, protecting identities, data and applications is becoming the top priority for CISOs and CIOs. Compliance with requirements such as NIS2 requires a data-centric approach and tighter security governance. At this conference,...