SlideShare a Scribd company logo
1 of 2
Download to read offline
L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4
Room Workshop 1 Room Workshop 2 Salle Plénière
8h-9h Accueil-Coffee
9h-9h10 Inauguration de la conférence- Salle Plénière
9h10-9h50 Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière
9h50-10h25 Workshop Cisco : The evolution of
cybercrime, how to keep up with
Intelligent Cyber Security for the
Real World
Workshop UNOMALY : Countering
the Black Box
Atelier VARONIS : Stockage en
ligne de vos données
10h25-10h45 Break- Pause Café
10h45-11h20 Atelier - Lancement du chapitre R2GS
Luxembourg - Groupe de travail des SOC
et SIEM managers
Workshop by Systemat: Citrix
Netscaler as Network and
Security consolidation platform
11h20-12h05 Workshop IBM : IBM Security
Intelligence
Workshop Checkpoint: Threat
Emulation
F5 Networks: Aligning Business
Strategy with the IT
infrastructure
12h05-12h45 Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière
12h45-13h45 Lunch et Networking au sein de l'espace Sponsors!!!
13h45-14h20 Workshop Cyberark: Step by Step to
Secure Privileged Accounts
Workshop Palo Alto networks :
Building Zero Trust
Architectures
Bluecoat: Security Analytics -
Analyze. Actualize.
14h25-15h00 Atelier KLEVERWARE : Comment s'intègre
la gestion des mobilités dans les
principes de recertification des accès
Workshop Trend Micro: Securing
your virtual datacenter
A10 Networks : Next Generation
Datacenter - Enabling the
Hyper-Consolidation Solution
15h-15h20 Break-Pause Café
15h20-15h55 Workshop Guidance: the Enemy Within –
Managing Insider Threats with Cyber
Forensic Protection
Workshop TRIPWIRE: Are you
investing in the right security
controls?
Workshop SKYBOX : Risk
Analytics - Using your data to
solve security challenges
15h55-16h30 Workshop Juniper: Live Hack-a-ton with
#countersecurity
Workshop DELL : Connected
security
Workshop Sophos: The Secure
Laptop: Using two-factor
authentication
16h30-17h00 Workshop EC-Council: Latest News in
the Security Industry!
Workshop Circl - Excellium :
Déclarer un incident auprès des
Cert(s)
Animation au sein des Sponsors et tirage au sort du concours
17h30-18h00 Clôture du premier Jour de conférence et Networking Drink
L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4
Room Workshop 1 Room Workshop 2
9h-9h10 Ouverture de la 2nd journée de conférences- Salle Plénière
9h10-10h10 Sinistralité et bonnes pratiques de détection d'intrusions - Salle Plénière
10h10-10h45 Keynote Trend Micro: Building Resilient Networks
Through Threat Awareness!
Workshop Cyberark: Step by Step to Secure
Privileged Accounts
10h45-11h20
Workshop UNOMALY : Countering the Black Box
Workshop Checkpoint: TDDoS Protector: Multi-
layered protection against Denial of Service
attacks
11h20-11h50 Break - Pause café
11h50-12h30 Table Ronde APDL / CNPD / Excellium :
Conséquences des intrusions informatique sur la
vie privée
Keynote Orange : Retour et limite de mise en
œuvre d’un service de supervision de la
sécurité au sein d’Orange
12h30-13h00 Workshop Bluecoat: Security Analytics - Analyze.
Actualize.
Session Ec-Concil: Virtualization and Cloud
Security – Can it be true?
13h00-13h30 Lunch et Networking au sein de l'espace Sponsors!!!
13h30-14h05 Keynote Sophos: Anatomy of an Attack – How hackers
threaten your security
Workshop DELL : Connected security
14h05-14h40 Keynote IBM: Trusteer - Fraud prevention
solutions for customer protection and employee
protection
Palo Alto Networks: Prevent APTs with the
Next-Generation Security Platform
14h40-15h10 Break - Pause café
15h10-15h45 Keynote Cisco : The evolution of cybercrime, and
how to keep up with Intelligent Cyber Security
for the Real World
Keynote Systemat - Seezam: Confidentialité et
Secret - Un MUST pour les Entreprises
15h45-16h20 Keynote Guidance : Security Intelligence through
endpoint forensic analytics
Workshop F5 Networks: Aligning Business
Strategy with the IT infrastructure
16h20-17h05 Keynote de Clôture par Nicolas Arpagian - Crime 2.0 : pourquoi le crime numérique paie - Salle
Plénière
Cloture de la Conference- Salle Plénière
19h00 BBQ avec concert Jazz - Salle Plénière

More Related Content

Viewers also liked

CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
About Girish HA
About Girish HAAbout Girish HA
About Girish HAHA Girish
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privilegesYogiji Creations
 
End To End Accounts Receivable Process
End To End Accounts Receivable ProcessEnd To End Accounts Receivable Process
End To End Accounts Receivable Processsamacdon
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CloudIDSummit
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
PMI Project Management Principles
PMI Project Management PrinciplesPMI Project Management Principles
PMI Project Management Principlestltiede
 

Viewers also liked (13)

CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy Intro
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
About Girish HA
About Girish HAAbout Girish HA
About Girish HA
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
Oracle ADF Case Study
Oracle ADF Case StudyOracle ADF Case Study
Oracle ADF Case Study
 
End To End Accounts Receivable Process
End To End Accounts Receivable ProcessEnd To End Accounts Receivable Process
End To End Accounts Receivable Process
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
PMI Project Management Principles
PMI Project Management PrinciplesPMI Project Management Principles
PMI Project Management Principles
 

Similar to agenda-2014

Kappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NLKappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NLKappa Data
 
VMUG.IT Meeting Napoli - Opening
VMUG.IT Meeting Napoli - OpeningVMUG.IT Meeting Napoli - Opening
VMUG.IT Meeting Napoli - OpeningAndrea Mauro
 
Opening VMUGIT Meeting a Napoli - 6 aprile 2016
Opening VMUGIT Meeting a Napoli - 6 aprile 2016Opening VMUGIT Meeting a Napoli - 6 aprile 2016
Opening VMUGIT Meeting a Napoli - 6 aprile 2016VMUG IT
 
WeeklyProgram
WeeklyProgramWeeklyProgram
WeeklyProgramLev Oren
 
Welcome to the 2016 HPC Advisory Council Switzerland Conference
Welcome to the 2016 HPC Advisory Council Switzerland ConferenceWelcome to the 2016 HPC Advisory Council Switzerland Conference
Welcome to the 2016 HPC Advisory Council Switzerland Conferenceinside-BigData.com
 
MCollective installed. And now? by Thomas Gelf
MCollective installed. And now? by Thomas GelfMCollective installed. And now? by Thomas Gelf
MCollective installed. And now? by Thomas GelfNETWAYS
 
ApacheCon 2021: Cracking the nut with Apache Pulsar (FLiP)
ApacheCon 2021:  Cracking the nut with Apache Pulsar (FLiP)ApacheCon 2021:  Cracking the nut with Apache Pulsar (FLiP)
ApacheCon 2021: Cracking the nut with Apache Pulsar (FLiP)Timothy Spann
 
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaIBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaCasey Lucas
 
Astute symposium 2013-10-10_introduction_elena_tsiporkova
Astute symposium 2013-10-10_introduction_elena_tsiporkovaAstute symposium 2013-10-10_introduction_elena_tsiporkova
Astute symposium 2013-10-10_introduction_elena_tsiporkovaSirris
 
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITDell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITKenneth de Brucq
 
Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day Simen Sommerfeldt
 
OpenShift-webinaari 31.1. / Ambientian esitykset
OpenShift-webinaari 31.1. / Ambientian esityksetOpenShift-webinaari 31.1. / Ambientian esitykset
OpenShift-webinaari 31.1. / Ambientian esityksetAmbientia
 
Elenco appuntoutlook
Elenco appuntoutlookElenco appuntoutlook
Elenco appuntoutlookmarirossi
 
LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)
LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)
LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)Luigi Tommaseo
 
Hr pro digital day 2019 - keynote presentation from Philippe Van Impe
Hr pro digital day 2019 - keynote presentation from Philippe Van ImpeHr pro digital day 2019 - keynote presentation from Philippe Van Impe
Hr pro digital day 2019 - keynote presentation from Philippe Van ImpeDigitYser
 
iotmashup - intro - allott
iotmashup - intro - allottiotmashup - intro - allott
iotmashup - intro - allottwebinos project
 
5a8f4d2db79f121ba88d85c0
5a8f4d2db79f121ba88d85c05a8f4d2db79f121ba88d85c0
5a8f4d2db79f121ba88d85c0GeremyTandos
 

Similar to agenda-2014 (20)

Technology Days Agenda
Technology Days AgendaTechnology Days Agenda
Technology Days Agenda
 
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NLKappa Data Roadshow 2015 - April 8th at Rijswijk, NL
Kappa Data Roadshow 2015 - April 8th at Rijswijk, NL
 
VMUG.IT Meeting Napoli - Opening
VMUG.IT Meeting Napoli - OpeningVMUG.IT Meeting Napoli - Opening
VMUG.IT Meeting Napoli - Opening
 
Opening VMUGIT Meeting a Napoli - 6 aprile 2016
Opening VMUGIT Meeting a Napoli - 6 aprile 2016Opening VMUGIT Meeting a Napoli - 6 aprile 2016
Opening VMUGIT Meeting a Napoli - 6 aprile 2016
 
WeeklyProgram
WeeklyProgramWeeklyProgram
WeeklyProgram
 
Iot mashup intro
Iot mashup introIot mashup intro
Iot mashup intro
 
Welcome to the 2016 HPC Advisory Council Switzerland Conference
Welcome to the 2016 HPC Advisory Council Switzerland ConferenceWelcome to the 2016 HPC Advisory Council Switzerland Conference
Welcome to the 2016 HPC Advisory Council Switzerland Conference
 
MCollective installed. And now? by Thomas Gelf
MCollective installed. And now? by Thomas GelfMCollective installed. And now? by Thomas Gelf
MCollective installed. And now? by Thomas Gelf
 
ApacheCon 2021: Cracking the nut with Apache Pulsar (FLiP)
ApacheCon 2021:  Cracking the nut with Apache Pulsar (FLiP)ApacheCon 2021:  Cracking the nut with Apache Pulsar (FLiP)
ApacheCon 2021: Cracking the nut with Apache Pulsar (FLiP)
 
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaIBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
 
Astute symposium 2013-10-10_introduction_elena_tsiporkova
Astute symposium 2013-10-10_introduction_elena_tsiporkovaAstute symposium 2013-10-10_introduction_elena_tsiporkova
Astute symposium 2013-10-10_introduction_elena_tsiporkova
 
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITDell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
 
IPEC 2019 Agenda
IPEC 2019 AgendaIPEC 2019 Agenda
IPEC 2019 Agenda
 
Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day Tingenes internett for finn.no tech day
Tingenes internett for finn.no tech day
 
OpenShift-webinaari 31.1. / Ambientian esitykset
OpenShift-webinaari 31.1. / Ambientian esityksetOpenShift-webinaari 31.1. / Ambientian esitykset
OpenShift-webinaari 31.1. / Ambientian esitykset
 
Elenco appuntoutlook
Elenco appuntoutlookElenco appuntoutlook
Elenco appuntoutlook
 
LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)
LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)
LINUXONE Client Event 15 - 16 September 2015 in Montpellier (France)
 
Hr pro digital day 2019 - keynote presentation from Philippe Van Impe
Hr pro digital day 2019 - keynote presentation from Philippe Van ImpeHr pro digital day 2019 - keynote presentation from Philippe Van Impe
Hr pro digital day 2019 - keynote presentation from Philippe Van Impe
 
iotmashup - intro - allott
iotmashup - intro - allottiotmashup - intro - allott
iotmashup - intro - allott
 
5a8f4d2db79f121ba88d85c0
5a8f4d2db79f121ba88d85c05a8f4d2db79f121ba88d85c0
5a8f4d2db79f121ba88d85c0
 

More from ITnation Luxembourg

Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016ITnation Luxembourg
 
Devoteam-résultats financiers 2015
Devoteam-résultats financiers 2015Devoteam-résultats financiers 2015
Devoteam-résultats financiers 2015ITnation Luxembourg
 
Les qualifications de demain dans les TIC2016
Les qualifications de demain dans les TIC2016Les qualifications de demain dans les TIC2016
Les qualifications de demain dans les TIC2016ITnation Luxembourg
 
vmware-cloud-careers-infographic
vmware-cloud-careers-infographicvmware-cloud-careers-infographic
vmware-cloud-careers-infographicITnation Luxembourg
 

More from ITnation Luxembourg (7)

Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
Devoteam-résultats financiers 2015
Devoteam-résultats financiers 2015Devoteam-résultats financiers 2015
Devoteam-résultats financiers 2015
 
Les qualifications de demain dans les TIC2016
Les qualifications de demain dans les TIC2016Les qualifications de demain dans les TIC2016
Les qualifications de demain dans les TIC2016
 
Careers it by VMware
Careers it by VMwareCareers it by VMware
Careers it by VMware
 
vmware-cloud-careers-infographic
vmware-cloud-careers-infographicvmware-cloud-careers-infographic
vmware-cloud-careers-infographic
 
security ddos summary
security ddos summarysecurity ddos summary
security ddos summary
 
Post luxembourg présentation
Post luxembourg présentationPost luxembourg présentation
Post luxembourg présentation
 

Recently uploaded

Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 

Recently uploaded (9)

Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 

agenda-2014

  • 1. L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4 Room Workshop 1 Room Workshop 2 Salle Plénière 8h-9h Accueil-Coffee 9h-9h10 Inauguration de la conférence- Salle Plénière 9h10-9h50 Table Ronde - "La réalité de la menace - Les intrusions et leur détection"- Salle Plénière 9h50-10h25 Workshop Cisco : The evolution of cybercrime, how to keep up with Intelligent Cyber Security for the Real World Workshop UNOMALY : Countering the Black Box Atelier VARONIS : Stockage en ligne de vos données 10h25-10h45 Break- Pause Café 10h45-11h20 Atelier - Lancement du chapitre R2GS Luxembourg - Groupe de travail des SOC et SIEM managers Workshop by Systemat: Citrix Netscaler as Network and Security consolidation platform 11h20-12h05 Workshop IBM : IBM Security Intelligence Workshop Checkpoint: Threat Emulation F5 Networks: Aligning Business Strategy with the IT infrastructure 12h05-12h45 Keynote SAFENET: It's now or never – Why you are more important than you think! - Salle Plénière 12h45-13h45 Lunch et Networking au sein de l'espace Sponsors!!! 13h45-14h20 Workshop Cyberark: Step by Step to Secure Privileged Accounts Workshop Palo Alto networks : Building Zero Trust Architectures Bluecoat: Security Analytics - Analyze. Actualize. 14h25-15h00 Atelier KLEVERWARE : Comment s'intègre la gestion des mobilités dans les principes de recertification des accès Workshop Trend Micro: Securing your virtual datacenter A10 Networks : Next Generation Datacenter - Enabling the Hyper-Consolidation Solution 15h-15h20 Break-Pause Café 15h20-15h55 Workshop Guidance: the Enemy Within – Managing Insider Threats with Cyber Forensic Protection Workshop TRIPWIRE: Are you investing in the right security controls? Workshop SKYBOX : Risk Analytics - Using your data to solve security challenges 15h55-16h30 Workshop Juniper: Live Hack-a-ton with #countersecurity Workshop DELL : Connected security Workshop Sophos: The Secure Laptop: Using two-factor authentication 16h30-17h00 Workshop EC-Council: Latest News in the Security Industry! Workshop Circl - Excellium : Déclarer un incident auprès des Cert(s) Animation au sein des Sponsors et tirage au sort du concours 17h30-18h00 Clôture du premier Jour de conférence et Networking Drink
  • 2. L E S R E N C O N T R E S D E L A S E C U R I T E 2 0 1 4 Room Workshop 1 Room Workshop 2 9h-9h10 Ouverture de la 2nd journée de conférences- Salle Plénière 9h10-10h10 Sinistralité et bonnes pratiques de détection d'intrusions - Salle Plénière 10h10-10h45 Keynote Trend Micro: Building Resilient Networks Through Threat Awareness! Workshop Cyberark: Step by Step to Secure Privileged Accounts 10h45-11h20 Workshop UNOMALY : Countering the Black Box Workshop Checkpoint: TDDoS Protector: Multi- layered protection against Denial of Service attacks 11h20-11h50 Break - Pause café 11h50-12h30 Table Ronde APDL / CNPD / Excellium : Conséquences des intrusions informatique sur la vie privée Keynote Orange : Retour et limite de mise en œuvre d’un service de supervision de la sécurité au sein d’Orange 12h30-13h00 Workshop Bluecoat: Security Analytics - Analyze. Actualize. Session Ec-Concil: Virtualization and Cloud Security – Can it be true? 13h00-13h30 Lunch et Networking au sein de l'espace Sponsors!!! 13h30-14h05 Keynote Sophos: Anatomy of an Attack – How hackers threaten your security Workshop DELL : Connected security 14h05-14h40 Keynote IBM: Trusteer - Fraud prevention solutions for customer protection and employee protection Palo Alto Networks: Prevent APTs with the Next-Generation Security Platform 14h40-15h10 Break - Pause café 15h10-15h45 Keynote Cisco : The evolution of cybercrime, and how to keep up with Intelligent Cyber Security for the Real World Keynote Systemat - Seezam: Confidentialité et Secret - Un MUST pour les Entreprises 15h45-16h20 Keynote Guidance : Security Intelligence through endpoint forensic analytics Workshop F5 Networks: Aligning Business Strategy with the IT infrastructure 16h20-17h05 Keynote de Clôture par Nicolas Arpagian - Crime 2.0 : pourquoi le crime numérique paie - Salle Plénière Cloture de la Conference- Salle Plénière 19h00 BBQ avec concert Jazz - Salle Plénière