PROGRAM
IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.

2026 CONFERENCES & WORKSHOPS
AI-Driven DNS Security as an Early Indicator of Advanced Threats
Organized by EFFICIENT IP
Continue reading
In 2026, cybersecurity is an AI vs. AI arms race, with attackers using AI to generate, adapt, and evade at machine speed. DNS security has evolved from passive resolution into an active, intelligence-driven defense layer playing a key role in this fight. By leveraging advanced machine learning techniques such as Natural Language Processing (NLP) and patented tuple clustering to analyze DNS data, DNS Security detects advanced threats in real time and disrupts them at the earliest stage. We will show how correlating global intelligence with local DNS behavior enables early identification of unknown malicious infrastructure, including DGAs and zero-day attacks. Attendees will learn how data-driven DNS security counters automated evasion and strengthens enterprise resilience in an evolving threat landscape.
Conference Moderator:

Fabien SMEETS
Customer Solution Architect – EFFICIENT IP
Discover how Mobilize Financial Services has been efficiently managing its database fleet with dbSQWare for over 10 years.
Organized by dbSQWare
Continue reading
More than 10 years ago, in 2015, Mobilize Financial Services (la captive financière de Renault Group) decided to integrate dbSQWare to manage its database fleet.
The goal was to enable its administrators teams to become more efficient and agile in the operational aspects of their databases — and beyond…
Come and discover the feedback from their DBA lead, MUNCH Gregory, on the daily use of dbSQWare within their organisation.
For those who may not know, dbSQWare manages 13 database engines: Oracle, SQL Server, MySQL/MariaDB, PostgreSQL, MongoDB, Cassandra, Sybase, DB2 LUW, Teradata, Adabas, Ingres and Informix. It allows you to perform (using the engines’ native commands): physical or logical backups/restores, environment copies, reorganisations, statistics, and provides a 360° dashboard with indicators & alerts to anticipate incidents.
dbSQWare — a French multi-DBMS operations software.
Speaker:
Gregory MUNCH
DBA lead – MOBILIZE FINANCIAL SERVICES
Mapping reassures you, action protects your OT environment.
Organized by INTEGRITY360
Continue readingImmediate action, even if partial and imperfect, is preferable to inaction.
It is possible to implement simple, cross-functional measures that, even without a perfect understanding of the OT environment, significantly reduce risk. A tactical try-and-learn approach delivers immediate value with limited initial commitment, while helping organisations make informed, confident decisions about larger-scale, long-term strategic investments, after having already tested and validated their value.
Key benefits of this approach :
-
Managing urgency amid uncertainty
-
Maximum leverage on risk reduction
-
Flexibility and reversibility
-
Accountability and a culture of response
-
Regulatory compliance and insurance readiness
Speaker:

Emmanuel BALLAND
Cyber Security Manager – INTEGRITY360 FRANCE
Digital identity management in the age of AI
Organized by PING IDENTITY
Continue reading
The proliferation of digital interactions has led to an explosion in the risks of identity theft and fraud.
How can you guarantee that your users are who they claim to be? And how can you secure user journeys without adding friction that could compromise the experience?
During this session, discover how to:
✔ Easily verify the identity of all types of users in real time
(facial recognition, liveness verification, voice biometrics, official documents, etc.)
✔ Reduce fraud and comply with KYC requirements
✔ Offer a seamless experience that meets your users' expectations
Speaker:

Cyril GROSJEAN
Principal Sales Engineer – PING IDENTITY
External security: are you as well protected as you think?
Continue readingFirewalls in place, audits completed, all indicators green… really?
From the outside, your information system sometimes tells a very different story — one filled with invisible gaps and polluted by false positives.
In this workshop, discover how Patrowl lets you see what an attacker sees, and how you can improve the effectiveness of your protection from the very first use.
Conference Moderator:

Vladimir KOLLA
General Manager – PATROWL
Modernizing the information system in support of operational performance.
Organized by Tanium
Continue reading
Speaker:

Pascal AVRIL
IT Operations Manager – GROUPE LDC
Manage your privileged access (PAM) easily with the ANSSI-certified PROVE IT bastion.
Organized by RUBYCAT-LABS
Continue readingPrivileged access management remains one of the major challenges in cybersecurity. Who is connecting? To what? When? And with the strengthening of regulations such as NIS2, securing these accesses is becoming more critical than ever. To help address this challenge, Rubycat, a software vendor from Brittany, has developed PROVE IT.
PROVE IT is a PAM-Bastion solution that monitors, records, and audits actions carried out by privileged accounts. It is currently the only PAM solution certified with the CSPN Security Visa by ANSSI (valid certificate).
It centralises all critical access, whether internal (administrators…) or external (managed service providers, remote maintainers…).
During this workshop, discover PROVE IT through a live demonstration of the solution.
Effectively prevent data leaks by securing potential exfiltration vectors — with the “DATA LEAK ACTIVE TESTING” platform
Organized by ENFORCIS
Continue reading
Ransomware gangs have made a clear shift toward data exfiltration and frequently succeed in circumventing the defenses of many organizations, including some of the most mature in terms of cybersecurity. This is essentially due to an imbalance that favors the attacker, who only needs to identify a single viable exfiltration vector, whereas defenders must monitor all vectors simultaneously and continuously—a requirement that has been extremely difficult to achieve so far given the vast diversity and number of potential vectors.
Enforcis offers an approach designed to address this imbalance with its “DATA LEAK ACTIVE TESTING” platform, which aims to:
- map all potential data exfiltration vectors,
- reproduce the same exfiltration techniques used by attackers (using dummy data),
- and provide prioritized recommendations based on data leakage risk coverage.
Speakers:

Faiz DJELLOULI
CEO & Founder – ENFORCIS

Renaud LIFCHITZ
CTO – ENFORCIS
ISO 27001 certification in 11 months: Onet’s (almost) crazy bet — and Tenacy’s key role as an accelerator
Organized by TENACY
Continue reading
How did an international group with 80,000 employees structure, manage, and industrialize its ISO 27001 approach in just 11 months?
Through this concrete feedback experience, Onet shares behind the scenes of its certification project: cybersecurity governance, selection of the GRC solution, multi-entity deployment, gap management, and audit preparation.
A pragmatic session to understand how Tenacy acted as a true accelerator, enabling Onet to move from a compliance ambition to an operational, structured, and sustainable ISMS management approach within a particularly tight timeframe.
From psychology to practice: adapting cybersecurity training for greater impact
Organized by SOSAFE
Continue reading
This workshop explores the role of psychology in the effectiveness of cybersecurity training. The goal is to understand how to adapt awareness formats to maximize participants’ understanding, retention, and engagement.
Speaker:

Julien GINESTET
Digital Account Executive – SOSAFE
Exposure Management, the cornerstone of the Defense Center
Organized by ORANGE CYBERDEFENSE FRANCE
Continue reading
-
AI is not only an advantage for organisations; it is also a powerful lever for cyber attackers.
-
How does this force us to strengthen — or even reinvent — our defence strategy?
-
We propose to share our vision of the Defense Center and explain why one of its key pillars, Exposure Management, is becoming critical for organisations in the age of AI.
Speakers:

Benoit ZIGO
Sales Director – ORANGE CYBERDEFENSE FRANCE

Adrien PETIT
Technical Business Specialist – ORANGE CYBERDEFENSE FRANCE

Harinaivo RATSIMANOHATRA
IT Director – MEDIAN TECHNOLOGIES

Christophe VERDIER
Chief Information Security Officer (CISO) – MEDIAN TECHNOLOGIES
