|09h00 > 10h00||Plenary 3Industry 4.0, artificial intelligence and quantum in cyber security.|
|10h15 > 11h00 ||A10 ROOM1|
Cybercrime against field investigators
CYBERWATCH: Monitor and fix your vulnerabilities as soon as possible
Protection of health data
|11h00 > 11h30 ||PAUSE|
|11h30 > 12h30||A13 ROOM1 |
How to ensure the security of the data center?
Blockchain: Confidence and Digital Security
|12h30 > 14h00||BREAKFAST AND NETWORKING BREAK|
|14h00 > 15h00||A16 ROOM1|
Computer hacking techniques that threaten states in live demonstration
Cybersecurity guidelines for civil society: understanding of needs, identification of gaps, definition of appropriate messages for different targets, mobilization of key actors, etc.
WORKSHOP TEAM HEXPRESSO: Exploitation of advanced web vulnerabilities, from basics to advanced techniques.
|15h15 > 16h15||A18 ROOM1 |
Behavioral study, deeplearning for a more efficient security. CCDOC NEC? DarkTrace, Sophos
Personal data of citizens held by operators, banks and supermarkets: Legal obligations?
WORKSHOP TEAM HEXPRESSO: Advanced Exploitation of Web Vulnerabilities, from basics to advanced technique.
|16h15 > 16h45 ||PAUSE|
|16h45 > 17h30||A20 ROOM1 |
Https is not enough what to do ?
Cryptomonaie, Artificial Intelligence, Iot: What Model of Regulation
Cyberculture: new needs, new jobs.
|17h30 > 18h00||CLOSING: MINISTER OF THE ARMED FORCES / MINISTER OF THE INTERIOR||WORD FROM THE ORGANIZERS|
|20h30 ||KING FAHD Gala Dinner||AWARDS AWARDS: Public / Private Organization||Winner HACKATHON / SEC DAYS CTF - Personal Initiatives !!|