Conferences

more criteria

more criteria

Salle

Typology

Dates

    Aucun résultat avec vos critères de recherche

    -
    - Salle Fourvière

    An overview of cyberthreats: from VSEs to major groups, we're all concerned!

    Attacks on security equipment at the edge of information systems, targeted ransomware, sophisticated phishing attacks, attacks on supply chains, theft and leakage of sensitive data, exploitation of vulnerabilities in everyday tools: the cyber security landscape is changing fast, driven by the increasing professionalism of cyber criminals and the proliferation of attack vectors. Cyber threats now come from everywhere and spare no-one: from very small businesses to major groups, including public authorities, healthcare and higher education establishments, no organisation is immune. Whatever its size, business sector or level of digital maturity. Against this backdrop, how can you anticipate tomorrow's cyber attacks, strengthen your organisational resilience and ensure that cyber security becomes everyone's business?
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Rémi GRIVEL - President - CLUSIR Auvergne-Rhône-Alpes
    • Marianne DELARUE - Digital Security Officer for Auvergne-Rhône-Alpes - ANSSI
    • Denis BOYER - Cyber Risk Awareness Officer - Cybermalveillance.gouv.fr
    • Alain BOUILLÉ - General Delegate - CESIN
    • Didier LAGE - RECyM Zonal Coordinator - Police Nationale
    • Alexandre MARGUERITE - Co-founder & managing director - Devensys Cybersecurity
    -
    - Salle Fourvière

    Data security in the age of AI: best practices & demonstrations

    Generative artificial intelligence is revolutionising the way we work, but it also raises new challenges in terms of security and data protection. This workshop will shed light on the emerging risks associated with the use of AI, as well as concrete levers to address them. Through use cases and demonstrations, you will discover how to implement an effective data security strategy within your organisation. This session will also be an opportunity to discover our latest innovations, such as Data Security Posture Management for AI, which provides visibility into user interactions with generative AI applications and recommendations for security policies to implement to improve your security posture.
    • Lyon Cyber Expo
    • Workshop

    Speakers

    • Saida LAIGA - Solution Engineer, Data Security - Microsoft

    Partenaires

    -
    - Salle Croix-Rousse

    CRA, NIS2, DORA: what action plan is needed to comply with cyber regulations?

    Europe's cybersecurity regulatory landscape is expanding at a rapid pace: the NIS2 directive for critical sectors, the DORA regulation for the financial sector, the Cyber Resilience Act (CRA) for digital products, etc. These reference texts impose new obligations in terms of resilience, transparency, governance and security. But between legal complexity and operational impact, companies often struggle to turn these requirements into concrete action plans. Common points, specific features, upcoming deadlines: how do these three major regulatory pillars affect organisations' cyber resilience strategies? What are the essential steps for compliance? How do these requirements fit in with existing cyber security systems? What are the new responsibilities for managers, CIOs and technology suppliers? Here are some answers, to help you move from a reactive approach to a controlled compliance strategy.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Nicolas DOOGHE - Secretary general - CLUSIR Auvergne-Rhône-Alpes
    • Franz REGUL - Cybersecurity Director - Bpifrance
    • Stéphanie REVOL - Lawyer - Revol Avocat
    • Yoan ISSARTEL - CTO & Co-founder - Elysium Security
    • Jérémy ROSEN - Technical manager for the embedded systems division - Smile
    • Emmanuel PETIT - Club 27001 Lyon Manager - Club 27001
    -

    Software erodes, hardware evolves: don't miss the opportunity to fix both.

    Long-life devices face a double threat: software erosion and evolving hardware platforms. Quick fixes and outdated architectures make products vulnerable, difficult to maintain, and impossible to upgrade safely. But hardware migration isn't just a challenge—it's an opportunity to do better. In this joint conference by Witekio and Avnet Silica, discover how to clean up legacy code, rethink your architecture, and align your next hardware with security principles from the ground up. Learn how to recognise the signs of ageing software, leverage trusted hardware to strengthen security, and refactor without blowing up your roadmap. Practical tools, proven frameworks and real-world experience: everything you need to make your next transition a success.
    • Lyon Cyber Expo
    • Workshop

    Speakers

    • Laurent LAGOSANTO - Software Security Architect - Avnet Silica
    • Renaud DIDIER - EU Sales Lead - Witekio
    • Pierre LECOMTE - Solutions Manager - Witekio

    Partenaires

    -
    - Salle Fourvière

    Cyber risk analysis: how to assess your exposure and prepare?

    Against a backdrop of accelerating digitalisation and increasingly sophisticated cyber threats, the question is no longer whether an organisation will be targeted, but when and how. SMEs and SMIs in particular are on the front line when it comes to cyber attacks, which are often targeted precisely because they are less prepared than large companies. Yet it is possible to protect oneself effectively without mobilising resources that are out of reach. It all starts with a clear understanding of your exposure to risk. That's why cyber risk analysis is becoming an essential step in anticipating vulnerabilities, prioritising security actions and strengthening resilience. How can we put in place a practical approach to assessing exposure to cyber threats? What are the tools and methodologies for identifying the relevant risks? How can technical issues be translated into strategic decisions? What practices should you adopt to build a clear, actionable risk map tailored to your sector? Discover the keys to moving from a reactive posture to a genuine culture of proactive risk management.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Ian GRISPAN - Technical Leader Audit & Conformity, PASSI & PACS qualifications - Airbus Protect
    • Tony HEDOUX - General Delegate - Club Ebios
    • Arnaud MARTIN - Head of Operational Risk - Caisse des Dépôts
    • Laurent CAMUS - RECyM Zonal Coordinator - RECyM
    • Hervé THIBAULT - Chief Strategy Officer - Metsys
    • Jean-Christophe MARPEAU - National Cybersecurity Advisor - Cap'tronic
    -
    - Salle Croix-Rousse

    Post-Quantic Cryptography : today's ISS challenge, facing tomorrow's attacks

    Quantum computing, still in its infancy, already poses a credible threat to the traditional cryptographic algorithms on which information system security is based. Faced with this prospect, post-quantum cryptography (PQC) is no longer a theoretical possibility: it is becoming a strategic imperative to protect today the data that must remain confidential tomorrow. Algorithms currently being standardised (NIST), performance and implementation challenges, constraints for integration into existing systems and transition timelines for businesses and government agencies: is quantum-resistant cryptography technically and operationally ready? Discover the cryptographic changes that must be made without delay, or risk exposing critical infrastructure to future threats today.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Fabrice DEBLOCK - Journalist -
    • Guillaume COLLARD - Founder - CSB School
    • Damien STEHLÉ - Chief Scientist - CryptoLab
    • Stanislas LYCHOLAT - Head of Cybersecurity consulting GRC & Crisis Management - Thalès
    • Mikael CARMONA - Head of Component Safety Laboratory - CEA-Leti
    • Benjamin WESOLOWSKI - Researcher - CNRS
    -
    - Salle Fourvière

    Boost your firewall with Threat Intelligence: it's possible!

    The value of Threat Intelligence in SIEM and SOC environments is well established. But did you know that this flow of information, which plays an essential role in anticipating, detecting and neutralising cyber-attacks, can also enhance the capabilities of your Next Gen firewalls?
    • Lyon Cyber Expo
    • Workshop

    Speakers

    • David TOUZEAU - PreSales Manager France - Kaspersky
    • Tony AUDOIN - Head of Channel France - Kaspersky

    Partenaires

    -
    - Salle Croix-Rousse

    Data-centric cybersecurity: protecting identities, data and applications in a multi-cloud world

    In a cloud-based and distributed world, protecting identities, data and applications is becoming the top priority for CISOs and CIOs. Compliance with requirements such as NIS2 requires a data-centric approach and tighter security governance. At this conference, Thales, a leading provider of cyber security solutions, and Randstad Digital, a trusted integrator, will share their joint vision: how to strengthen the security of hybrid and multi-cloud environments while ensuring traceability, compliance and access control. Use cases, field feedback and a roadmap for modern, pragmatic and resilient cyber security.
    • Workshop

    Partenaires

    -
    - Salle Fourvière

    Managing access to industrial control systems: a critical issue

    In a context where industrial infrastructures are increasingly interconnected, managing access to control systems (SCADA, PLC, DCS, etc.) has become a key issue in operational cybersecurity. Remote access, external maintenance, network segmentation, user rights: the slightest flaw can open the door to attacks with serious consequences for production, security and business continuity. What are the specific challenges of identity and access management (IAM) in industrial environments? How can security, traceability and operational continuity be reconciled? What tools and methodologies can be used to control access without slowing down field teams or service providers? With securing access to industrial control systems no longer just a best practice but a regulatory requirement (NIS2 directive, IEC 62443 and ISO/IEC 27001 standards), critical infrastructure operators and industrial companies must implement robust, traceable access policies tailored to the specificities of OT environments.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Jean-Christophe MARPEAU - National Cybersecurity Advisor - Cap'tronic
    • Patrice BOCK - Founder - Bock Conseil
    • Sabri KHEMISSA - Co-founder - Fortress Cybersecurity
    • Sébastien GIAI-CHECA - Head of Architects, Southern Region - SCC France
    • Géraud GONZALEZ - Partner Cybersecurity - EY
    -

    XDR, SIEM, Cloud... what if everything worked as a single defence system reinforced by AI? 45 minutes to change your perspective on cybersecurity.

    In increasingly coordinated and rapid attack scenarios that incorporate AI, it is no longer enough to simply stack security tools (firewall, SIEM, EDR, etc.). It is time for these components to act as a coherent whole, reinforced by AI. This workshop immerses you in a new approach to AI-powered cybersecurity: unified, intelligent and automated. You will discover why data silos and unconnected tools are slowing down your response time, how to move from a reactive stance to a proactive defence, what attackers can see that you cannot yet see, and how to drastically reduce detection and response times through orchestration and AI. Make way for fluid, orchestrated and, above all, effective security.
    • Lyon Cyber Expo
    • Workshop

    Speakers

    • Romain CUREL - Pre-sales Security - Microsoft

    Partenaires

    -
    - Salle Fourvière

    SMEs and local authorities: vulnerable targets, a cyber offering to match

    With cyberattacks on the rise and increasingly targeting smaller organisations, SMEs/SMIs and local authorities are now seen as the weak links in cybersecurity. Limited resources, heterogeneous infrastructure and a lack of awareness mean that these players are highly vulnerable, despite performing functions that are essential to the economy and everyday life. However, there is a clear mismatch between the specific needs of these organisations and the current offering in terms of cybersecurity. In this context, what responsibilities do public authorities, cybersecurity service providers and contractors have? How can we build a more accessible, clearer and better tailored cybersecurity offering that takes into account their constraints, in order to rethink cybersecurity that is trustworthy and adapted to the realities on the ground?
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Marie LEYNAUD - Journalist - Deuxième Écoute
    • Sandrine NGATCHOU - Cybersecurity Project Manager - Thalès Training & Simulation
    • Nicolas GUILLOUX - Regional Sales Director - Almond
    • Denis BOYER - Cyber Risk Awareness Officer - Cybermalveillance.gouv.fr
    -
    - Auditorium Confluence

    Autonomy, sovereignty: can European cybersecurity invent its own model?

    Against a backdrop of trade wars (US-China) and military conflicts (Ukraine-Russia), ever-increasing threats and increasingly well-orchestrated attacks, and in an almost monopolistic cyber-economic landscape, can Europe today create the conditions for effective, sovereign cyber-security? Despite highly advanced technologies, increasing funding and a favourable regulatory environment, the European cyber sector faces a number of challenges if it is to create champions capable of scaling up quickly. These include, first and foremost, legal harmonisation at EU level and changes to the rules on competition and public procurement - the creation of a Buy European Act - to provide European cyber companies with orders and contracts. Without doing without American solutions, or copying their model, can we develop a form of sovereignty or strategic autonomy in cyber matters?
    • Prospective
    • Plenary session

    Speakers

    • Franz REGUL - Cybersecurity Director - Bpifrance
    • Alain BOUILLÉ - General Delegate - CESIN
    • Jean-Noël DE GALZAIN - President - Hexatrust
    • Emmanuel DUTEIL - Editorial director - L'Usine Nouvelle / L'Usine Digitale
    • Patricia MOUY - Cybersecurity program manager - CEA List
    -
    - Salle Croix-Rousse

    Digital sobriety: how cyber security can play its part

    At a time when the ecological transition is forcing us to rethink our digital habits, sobriety is becoming imperative. Bucking the trend, cybersecurity systems are based on increasingly heavy architectures: multiple logs, redundant infrastructure, intensive encryption, real-time monitoring, long-term storage, etc. While these practices are essential to ensuring system security, they also generate a growing environmental footprint that is often overlooked in digital sobriety assessments. So how can we reconcile digital security with the demand for sobriety? Is it possible to secure systems in other ways, with less complexity, less data and a smaller footprint? Event log reduction and intelligent governance, selective encryption, Zero Trust and Edge computing architectures, security data retention periods, and the sharing of cyber tools at sectoral or regional level: what approaches can reduce environmental impact without exposing organisations to risk?
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Fabrice DEBLOCK - Journalist -
    • Laure ALFONSI - Lecturer - Green IT
    • Nolwenn LE STER - Director of operations / Chair of the Cybersecurity Commission - Almond / Numeum
    • Julia DELRIEU - Sustainable IT & CSR Manager - Digital League
    • Simon LAMBERT - Researcher - ENS Lyon
    -

    REX: Controlling your external attack surface, a critical challenge for CISOs

    With the proliferation of domain names, the growing adoption of the cloud, SaaS and mobile applications, and the practice of shadow IT, organisations' external attack surface is constantly growing, often faster than their ability to secure it. How can you control your external attack surface? The presentation will cover critical blind spots (where are your hidden vulnerabilities?), the best strategies for regaining control (mapping, continuous monitoring, risk reduction, etc.), and customer feedback.
    • Lyon Cyber Expo
    • Workshop

    Partenaires

    -
    - Salle Fourvière

    New European Machinery Regulation: what are the cyber obligations for your industrial equipment and installations?

    With the new European Machinery Regulation set to come into force in January 2027, cybersecurity is becoming a regulatory requirement for manufacturers, integrators and operators of industrial equipment. Designed to address the growing risks associated with the digitisation of machines and the interconnection of systems, this regulation imposes new IT security requirements from the design stage and throughout the entire life cycle of equipment. This new legal framework has concrete consequences for industrial players. What cyber requirements must be incorporated into design and conformity assessment? How can a ‘cybersecurity by design’ approach be implemented that is compatible with industrial processes? Find out how to prepare for secure and long-lasting compliance of your equipment and facilities.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Jean-Christophe MARPEAU - National Cybersecurity Advisor - Cap'tronic
    • Sylvain ACOULON - Security consultant and robotics expert - CETIM
    -
    - Salle Croix-Rousse

    Security in the age of artificial intelligence: how to protect your generative AI applications

    Generative artificial intelligence is revolutionising how we use technology and opening up new possibilities. However, it also increases the attack surface, with the emergence of new risks. At the forefront is prompt injection, an emerging threat vector. So how can you effectively secure an AI application against these new attack methods? Through feedback, demonstrations and a joint presentation with Palo Alto Networks, discover how to implement end-to-end protection for generative AI applications.
    • Lyon Cyber Expo
    • Workshop

    Speakers

    • Émilie BROCHETTE - Business Developer IA Sec - Orange Cyberdefense
    • Aymar DE KERGORLAY - Domain Consultant - Palo Alto Networks
    • Martin CAMPOS - Security Pre-Sales Consultant, CISSP - Orange Cyberdefense

    Partenaires

    -
    - Salle Croix-Rousse

    Zero-Trust: meeting the challenge of integration

    The Zero-Trust model is emerging as a strategic response to modern threats, based on a simple principle: never trust, always verify. But between stated ambitions and the reality of existing information systems, integrating Zero-Trust remains a major challenge for businesses and public institutions alike. How can you assess your organisation's readiness for this paradigm shift? How can you integrate Zero Trust principles into an existing IT system without rebuilding everything? Which technological building blocks should you use (identity, micro-segmentation, supervision, IAM, SASE)? What governance should you put in place to align security, business and IT? There are many technical, organisational and operational challenges associated with implementing Zero Trust in complex, often heterogeneous and interconnected environments.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Maxence COSSALTER - Associate Director - Anima Conseil
    • Jean-Sébastien DUCHÊNE - Technical Director - Exakis Nelite
    • Vidya JUNGLEEA - Deputy treasurer - CECFYS
    • Yohann BURGAN - Chief Digital Officer - Alixio Group
    -
    - Salle Fourvière

    Cyber crisis management: how to work with the judicial authorities?

    When faced with a cyberattack, every minute counts. Beyond technical emergency measures, the relationship with law enforcement agencies becomes a key lever for an effective, coordinated response that complies with legal obligations. However, many organisations still approach this cooperation in a rush, without a clear framework or advance strategy. When and how should you alert the public prosecutor's office, the police or the specialised gendarmerie? What information should be shared, in what form, and with what guarantees of confidentiality? How can you balance the requirements of the investigation, business recovery and crisis communication? Clarifying the legal, operational and organisational issues related to cyber crisis management in conjunction with the relevant authorities enables collaboration based on trust, responsiveness and compliance.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Steven DOLBEAU - Associate Director - Anima Conseil
    • Didier LAGE - RECyM Zonal Coordinator - Police Nationale
    • Corentin MAHJOUB - Account manager - Onlynnov
    • Yann LOUBRY - Specialised Assistant in Cybercrime - Parquet de Paris / JUNALCO / Tribunal de Paris - Section Cybercriminalité (J3)
    -
    - Salle Fourvière

    Cybersecurity: companies face the recruitment challenge

    Cybersecurity is now a strategic issue for all organisations. But you still need the right talent to implement it. Against a backdrop of growing threats, companies are facing a chronic shortage of skilled professionals, exacerbated by increasing regulatory requirements, the diversification of cyber professions and the global war for talent. What profiles are really in demand today, and what skills do they require? How can you attract and retain talent in a highly competitive field? What role do work-study programmes, retraining, hybrid career paths and self-taught skills play? How can you rethink your recruitment criteria in the face of rapidly evolving technologies and threats? Discover practical insights to adapt your practices, open up the skills pool and build strong, sustainable cyber teams.
    • Lyon Cyber Expo
    • Conférence

    Speakers

    • Fabrice DEBLOCK - Journalist -
    • Alphonse DUPIERRE - Presales & solution specialist manager - Bechtle
    • Salem NAIT IDIR - Deputy general delegate - Digital League
    • Pierre-Antoine TROUBAT - General Delegate - ADIRA
    • Manon DUBIEN - Vice-President - CEFCYS
    • Vianney WATTINNE - Managing director - CSB School
    -
    - Salle Croix-Rousse

    Data anonymisation: securing usage without hindering projects

    Testing an application, developing a new service, exploiting data in BI or entrusting a project to a service provider... In a context of increasing cyberattacks and stricter regulations such as GDPR, DORA and NIS2, anonymisation is emerging as a key response to these uses. During this session, we will share real-life examples of companies that have carried out anonymisation projects in non-production environments. Find out how they have strengthened their cybersecurity while preserving the relevance and usability of data sets for business users.
    • Lyon Cyber Expo
    • Workshop

    Speakers

    • Marie-Céline BURLATS - Business Line Manager – Test Data Management - Arcad Software

    Partenaires

    Conferences - Lyon Cyber Expo