SECURITYDAYS | Official

Program 2019


TIME(H)...
08h00 > 09h00
HOME AND INSTALLATION OF GUESTS
09h00 > 09h30
Official Opening Ceremony
09h30 > 10h30
Plenary 1
Implementing National Cyber Security Strategies: Overview and Prospects
09h30 > 10h30
PAUSE
11h00 > 12h00
A01 ROOM1

Cyber-Threat Issues of Critical National Infrastructures (INC): What Solutions for the Energy and ICT Sectors
A02 ROOM2

"Cyber resilience of critical infrastructure: Putting one's IS to the test to better prepare for a cyber event"
A03 ROOM

Improving the cyber security of advanced infrastructures: new methods of attack and defense mechanisms
12h00 > 14h00
BREAKFAST AND NETWORKING BREAK
14h00 > 14h45
A04 ROOM1

Digital Transformation in Africa and Cybercrime: Latest Trends
A05 ROOM1

Cyber security of financial and industrial service platforms
A06 ROOM3

Bug bounty, a complement (essential) to classical intrusion tests
15h00 > 16h00
A07 ROOM1

How to ensure the cybersecurity of your IS with CRASHTESTER & EKLA
A08 ROOM2

GAINDE2000 / Digital Identity Management for Better Security
A09 ROOM3

EKLAIRA Securing Cyber-resilience through cloud computing: Micro-segmentation, Security-By-Design, Security Model "Zero Trust", SOC.
16h00 > 16h30
PAUSE
16h30 > 17h30
Plenary 2
Implementing National Cyber Security Strategies: Overview and Prospects

TIME(H)...
09h00 > 10h00
Plenary 3
Industry 4.0, artificial intelligence and quantum in cyber security.
10h15 > 11h00
A10 ROOM1

Cybercrime against field investigators
A11 ROOM2

CYBERWATCH: Monitor and fix your vulnerabilities as soon as possible
A12 ROOM3

Protection of health data
11h00 > 11h30
PAUSE
11h30 > 12h30
A13 ROOM1

TRACIP
A14 ROOM2

How to ensure the security of the data center?
A15 ROOM3

Blockchain: Confidence and Digital Security
12h30 > 14h00
BREAKFAST AND NETWORKING BREAK
14h00 > 15h00
A16 ROOM1

Computer hacking techniques that threaten states in live demonstration
A17 ROOM2

Cybersecurity guidelines for civil society: understanding of needs, identification of gaps, definition of appropriate messages for different targets, mobilization of key actors, etc.
ROOM 3

WORKSHOP TEAM HEXPRESSO: Exploitation of advanced web vulnerabilities, from basics to advanced techniques.
15h15 > 16h15
A18 ROOM1

Behavioral study, deeplearning for a more efficient security. CCDOC NEC? DarkTrace, Sophos
A19 ROOM2

Personal data of citizens held by operators, banks and supermarkets: Legal obligations?
ROOM 3

WORKSHOP TEAM HEXPRESSO: Advanced Exploitation of Web Vulnerabilities, from basics to advanced technique.
16h15 > 16h45
PAUSE
16h45 > 17h30
A20 ROOM1

Https is not enough what to do ?
A21 ROOM2

Cryptomonaie, Artificial Intelligence, Iot: What Model of Regulation
A22 ROOM3

Cyberculture: new needs, new jobs.
17h30 > 18h00
CLOSING: MINISTER OF THE ARMED FORCES / MINISTER OF THE INTERIOR
WORD FROM THE ORGANIZERS
20h30 KING FAHD Gala Dinner
AWARDS AWARDS: Public / Private Organization
Winner HACKATHON / SEC DAYS CTF - Personal Initiatives !!

You can also download the program in PDF

Download the PDF

All Rights Reserved © 2019 - Powered By  CONELSI