PROGRAM

IT & CYBERSECURITY MEETINGS enables you to gain and perfect skills through plenary conferences and “solutions” workshops led by experts in your sector of activity.

2026 CONFERENCES & WORKSHOPS

Filter
18 March 2026 09:00 to 09:45 Esterel Room Workshop

AI-Driven DNS Security as an Early Indicator of Advanced Threats

Organized by EFFICIENT IP

Continue reading

In 2026, cybersecurity is an AI vs. AI arms race, with attackers using AI to generate, adapt, and evade at machine speed. DNS security has evolved from passive resolution into an active, intelligence-driven defense layer playing a key role in this fight. By leveraging advanced machine learning techniques such as Natural Language Processing (NLP) and patented tuple clustering to analyze DNS data, DNS Security detects advanced threats in real time and disrupts them at the earliest stage. We will show how correlating global intelligence with local DNS behavior enables early identification of unknown malicious infrastructure, including DGAs and zero-day attacks. Attendees will learn how data-driven DNS security counters automated evasion and strengthens enterprise resilience in an evolving threat landscape.

Conference Moderator:

Fabien SMEETS

Fabien SMEETS
Customer Solution Architect – EFFICIENT IP

18 March 2026 09:00 to 09:45 Lérins Room Workshop

Discover how Mobilize Financial Services has been efficiently managing its database fleet with dbSQWare for over 10 years.

Organized by dbSQWare

Continue reading

More than 10 years ago, in 2015, Mobilize Financial Services (la captive financière de Renault Group) decided to integrate dbSQWare to manage its database fleet.

The goal was to enable its administrators teams to become more efficient and agile in the operational aspects of their databases — and beyond…

Come and discover the feedback from their DBA lead, MUNCH Gregory, on the daily use of dbSQWare within their organisation.

For those who may not know, dbSQWare manages 13 database engines: Oracle, SQL Server, MySQL/MariaDB, PostgreSQL, MongoDB, Cassandra, Sybase, DB2 LUW, Teradata, Adabas, Ingres and Informix. It allows you to perform (using the engines’ native commands): physical or logical backups/restores, environment copies, reorganisations, statistics, and provides a 360° dashboard with indicators & alerts to anticipate incidents.

dbSQWare — a French multi-DBMS operations software.

Speaker:

Gregory MUNCH
DBA lead – MOBILIZE FINANCIAL SERVICES

18 March 2026 09:00 to 09:45 Croisette Room Workshop

Mapping reassures you, action protects your OT environment.

Organized by INTEGRITY360

Continue reading

Immediate action, even if partial and imperfect, is preferable to inaction.
It is possible to implement simple, cross-functional measures that, even without a perfect understanding of the OT environment, significantly reduce risk. A tactical try-and-learn approach delivers immediate value with limited initial commitment, while helping organisations make informed, confident decisions about larger-scale, long-term strategic investments, after having already tested and validated their value.

Key benefits of this approach :

  • Managing urgency amid uncertainty

  • Maximum leverage on risk reduction

  • Flexibility and reversibility

  • Accountability and a culture of response

  • Regulatory compliance and insurance readiness

Speaker:

Emmanuel BALLAND

Emmanuel BALLAND
Cyber Security Manager – INTEGRITY360 FRANCE

18 March 2026 14:30 to 15:15 Lérins Room Workshop

Digital identity management in the age of AI

Organized by PING IDENTITY

Continue reading

The proliferation of digital interactions has led to an explosion in the risks of identity theft and fraud.
How can you guarantee that your users are who they claim to be? And how can you secure user journeys without adding friction that could compromise the experience?
During this session, discover how to:
✔ Easily verify the identity of all types of users in real time
(facial recognition, liveness verification, voice biometrics, official documents, etc.)
✔ Reduce fraud and comply with KYC requirements
✔ Offer a seamless experience that meets your users' expectations

Speaker:

Cyril GROSJEAN

Cyril GROSJEAN
Principal Sales Engineer – PING IDENTITY

18 March 2026 14:30 to 15:15 Esterel Room Workshop

External security: are you as well protected as you think?

Continue reading

Firewalls in place, audits completed, all indicators green… really?
From the outside, your information system sometimes tells a very different story — one filled with invisible gaps and polluted by false positives.
In this workshop, discover how Patrowl lets you see what an attacker sees, and how you can improve the effectiveness of your protection from the very first use.

Conference Moderator:

Vladimir KOLLA

Vladimir KOLLA
General Manager – PATROWL

18 March 2026 14:30 to 15:15 Croisette Room Workshop

Modernizing the information system in support of operational performance.

Organized by Tanium

Continue reading
Pascal Avril, IT Operations Manager at LDC Group, explains how through the power of the Tanium, LDC modernized their information system and improved operational performance. He highlights how the platform streamlined tooling, accelerated patching, improved compliance visibility, and enhanced user experience.

Speaker:

Pascal  AVRIL

Pascal AVRIL
IT Operations Manager – GROUPE LDC

19 March 2026 09:00 to 09:45 Lérins Room Workshop

Manage your privileged access (PAM) easily with the ANSSI-certified PROVE IT bastion.

Organized by RUBYCAT-LABS

Continue reading

Privileged access management remains one of the major challenges in cybersecurity. Who is connecting? To what? When? And with the strengthening of regulations such as NIS2, securing these accesses is becoming more critical than ever. To help address this challenge, Rubycat, a software vendor from Brittany, has developed PROVE IT.

PROVE IT is a PAM-Bastion solution that monitors, records, and audits actions carried out by privileged accounts. It is currently the only PAM solution certified with the CSPN Security Visa by ANSSI (valid certificate).
It centralises all critical access, whether internal (administrators…) or external (managed service providers, remote maintainers…).

During this workshop, discover PROVE IT through a live demonstration of the solution.

19 March 2026 09:00 to 09:45 Croisette Room Workshop

Effectively prevent data leaks by securing potential exfiltration vectors — with the “DATA LEAK ACTIVE TESTING” platform

Organized by ENFORCIS

Continue reading

Ransomware gangs have made a clear shift toward data exfiltration and frequently succeed in circumventing the defenses of many organizations, including some of the most mature in terms of cybersecurity. This is essentially due to an imbalance that favors the attacker, who only needs to identify a single viable exfiltration vector, whereas defenders must monitor all vectors simultaneously and continuously—a requirement that has been extremely difficult to achieve so far given the vast diversity and number of potential vectors.
Enforcis offers an approach designed to address this imbalance with its “DATA LEAK ACTIVE TESTING” platform, which aims to:
- map all potential data exfiltration vectors,
- reproduce the same exfiltration techniques used by attackers (using dummy data),
- and provide prioritized recommendations based on data leakage risk coverage.

Speakers:

Faiz DJELLOULI

Faiz DJELLOULI
CEO & Founder – ENFORCIS

Renaud LIFCHITZ

Renaud LIFCHITZ
CTO – ENFORCIS

19 March 2026 14:30 to 15:15 Croisette Room Workshop

ISO 27001 certification in 11 months: Onet’s (almost) crazy bet — and Tenacy’s key role as an accelerator

Organized by TENACY

Continue reading

How did an international group with 80,000 employees structure, manage, and industrialize its ISO 27001 approach in just 11 months?


Through this concrete feedback experience, Onet shares behind the scenes of its certification project: cybersecurity governance, selection of the GRC solution, multi-entity deployment, gap management, and audit preparation.


A pragmatic session to understand how Tenacy acted as a true accelerator, enabling Onet to move from a compliance ambition to an operational, structured, and sustainable ISMS management approach within a particularly tight timeframe.

19 March 2026 14:30 to 15:15 Lérins Room Workshop

From psychology to practice: adapting cybersecurity training for greater impact

Organized by SOSAFE

Continue reading

This workshop explores the role of psychology in the effectiveness of cybersecurity training. The goal is to understand how to adapt awareness formats to maximize participants’ understanding, retention, and engagement.

Speaker:

Julien GINESTET

Julien GINESTET
Digital Account Executive – SOSAFE

19 March 2026 14:30 to 15:15 Esterel Room Workshop

Exposure Management, the cornerstone of the Defense Center

Organized by ORANGE CYBERDEFENSE FRANCE

Continue reading
  • AI is not only an advantage for organisations; it is also a powerful lever for cyber attackers.

  • How does this force us to strengthen — or even reinvent — our defence strategy?

  • We propose to share our vision of the Defense Center and explain why one of its key pillars, Exposure Management, is becoming critical for organisations in the age of AI.

Speakers:

Benoit ZIGO

Benoit ZIGO
Sales Director – ORANGE CYBERDEFENSE FRANCE

Adrien PETIT

Adrien PETIT
Technical Business Specialist – ORANGE CYBERDEFENSE FRANCE

Harinaivo RATSIMANOHATRA

Harinaivo RATSIMANOHATRA
IT Director – MEDIAN TECHNOLOGIES

Christophe  VERDIER

Christophe VERDIER
Chief Information Security Officer (CISO) – MEDIAN TECHNOLOGIES