SlideShare a Scribd company logo
1 of 7
EVENT ORGANIZATION
PARTNERSHIP
CYBERSECURITY BREAKFAST
The Cybersecurity Breakfast is a professional event organized each month
by SECURITYMADEIN.LU, the national agency promoting cybersecurity to
businesses and administrations, which invites a partner to present their
expertise on a particular topic.
On May 14, 2019, we reached the number of 30 CSBs organized by
SECURITYMADEIN.LU thanks to our partners!
Last partners with whom we worked:
AGENDA
8:30 Registration opens
9:00 Keynote
by the sponsor
9:30 Roundtable
3 to 4 participants
Moderation by SECURITMADEIN.LU
10:00 Conclusions and coffee
Keynote speaker during the CSB28 (OpenField)
1ST STEP: DISCUSSION BETWEEN
ORGANIZERS
(SECURITYMADEIN.LU AND PARTNER)
Basic information needed:
1. Contact of the organizer
2. Date of the event
3. Title of the event
4. Name of keynote speaker
5. Keynote title
6. Logo of the organizer (.ai and .jpg)
Roundtable with MICROSOFT and MEPs
2ND STEP: ROUNDTABLE ORGANIZATION
Discussion between SECURITYMADEIN.LU and the partner to establish the
list of potential speakers.
• 3 to 4 speakers with various point of view / background.
The moderation is done by SECURITYMADEIN.LU
Once the speakers are validated and available:
• Publication of the agenda on SECURITYMADEIN.LU and C3 websites.
• A call or meeting is organized the speakers, the organizer and
SECURITYMADEIN.LU to talk about the topics that will be discuss.
ORGANIZATIONAL DETAILS
Finance:
The partner pays for the rental of the Eternal Blue room for 50 people
• € 1,520 excluding taxes half day (catering included)
Registration Management:
• The registration process is handle by SECURITYMADEIN.LU
• In accordance with the GDPR, participant data is not shared with
the partner unless they express their consent.
• Invitation via Mailing 4 or 3 weeks before the event
• The partner receives the invitation to share with its network
THANK YOU!
www.securitymadein.lu

More Related Content

Similar to Cybersecurity Breakfast Luxembourg - SECURITYMADEIN.LU

Phiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfra
Phiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfraPhiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfra
Phiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfraVietnam Open Infrastructure User Group
 
Media Kit- Geneva Startup and SMB Summit 2019
Media Kit- Geneva Startup and SMB Summit 2019Media Kit- Geneva Startup and SMB Summit 2019
Media Kit- Geneva Startup and SMB Summit 2019Shaumik Saha
 
IoT Insurance Observatory
IoT Insurance Observatory IoT Insurance Observatory
IoT Insurance Observatory Matteo Carbone
 
Upcoming Conferences In India , 2019
Upcoming Conferences In India , 2019Upcoming Conferences In India , 2019
Upcoming Conferences In India , 2019All Conference Alert
 
Healthcom apresentação eng
Healthcom apresentação engHealthcom apresentação eng
Healthcom apresentação engIEEE ACCOUNT
 
Upcoming conferences on management and leadership in june, 2019
Upcoming conferences on management and leadership in june, 2019Upcoming conferences on management and leadership in june, 2019
Upcoming conferences on management and leadership in june, 2019All Conference Alert
 
Introduction to the FutureTDM project
Introduction to the FutureTDM projectIntroduction to the FutureTDM project
Introduction to the FutureTDM projectFutureTDM
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Call for participation smart services summit 2020
Call for participation smart services summit 2020Call for participation smart services summit 2020
Call for participation smart services summit 2020Shaun West
 
Nov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletterNov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletterDavid Wortley
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, MumbaiRahul Neel Mani
 
TDI Asia 2016 Conference - Feedback & Plans for 2017
TDI Asia 2016 Conference - Feedback & Plans for 2017TDI Asia 2016 Conference - Feedback & Plans for 2017
TDI Asia 2016 Conference - Feedback & Plans for 2017The Digital Insurer
 
Call for participants - Jisc Digital Festival 2015
Call for participants - Jisc Digital Festival 2015Call for participants - Jisc Digital Festival 2015
Call for participants - Jisc Digital Festival 2015Jisc
 

Similar to Cybersecurity Breakfast Luxembourg - SECURITYMADEIN.LU (20)

Phiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfra
Phiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfraPhiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfra
Phiên sáng - 02 - Khai mạc và phát biểu của VIA và VietOpenInfra
 
Media Kit- Geneva Startup and SMB Summit 2019
Media Kit- Geneva Startup and SMB Summit 2019Media Kit- Geneva Startup and SMB Summit 2019
Media Kit- Geneva Startup and SMB Summit 2019
 
IoT Insurance Observatory
IoT Insurance Observatory IoT Insurance Observatory
IoT Insurance Observatory
 
Upcoming Conferences In India , 2019
Upcoming Conferences In India , 2019Upcoming Conferences In India , 2019
Upcoming Conferences In India , 2019
 
E-Guide CWH&S Project eZine_Issue 2
E-Guide CWH&S Project eZine_Issue 2E-Guide CWH&S Project eZine_Issue 2
E-Guide CWH&S Project eZine_Issue 2
 
Healthcom apresentação eng
Healthcom apresentação engHealthcom apresentação eng
Healthcom apresentação eng
 
BIC2020 - Info (Dec)
BIC2020 - Info (Dec)BIC2020 - Info (Dec)
BIC2020 - Info (Dec)
 
Upcoming conferences on management and leadership in june, 2019
Upcoming conferences on management and leadership in june, 2019Upcoming conferences on management and leadership in june, 2019
Upcoming conferences on management and leadership in june, 2019
 
IoTinsObs
IoTinsObsIoTinsObs
IoTinsObs
 
Introduction to the FutureTDM project
Introduction to the FutureTDM projectIntroduction to the FutureTDM project
Introduction to the FutureTDM project
 
Island to connect
Island to connect Island to connect
Island to connect
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Upcoming Conferences In India
Upcoming Conferences In IndiaUpcoming Conferences In India
Upcoming Conferences In India
 
Call for participation smart services summit 2020
Call for participation smart services summit 2020Call for participation smart services summit 2020
Call for participation smart services summit 2020
 
Nov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletterNov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletter
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
TDI Asia 2016 Conference - Feedback & Plans for 2017
TDI Asia 2016 Conference - Feedback & Plans for 2017TDI Asia 2016 Conference - Feedback & Plans for 2017
TDI Asia 2016 Conference - Feedback & Plans for 2017
 
Call for participants - Jisc Digital Festival 2015
Call for participants - Jisc Digital Festival 2015Call for participants - Jisc Digital Festival 2015
Call for participants - Jisc Digital Festival 2015
 
Upcoming conferences in august 2019
Upcoming conferences in august 2019Upcoming conferences in august 2019
Upcoming conferences in august 2019
 
Iwdk2014 v5
Iwdk2014 v5Iwdk2014 v5
Iwdk2014 v5
 

Recently uploaded

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Cybersecurity Breakfast Luxembourg - SECURITYMADEIN.LU

  • 2. CYBERSECURITY BREAKFAST The Cybersecurity Breakfast is a professional event organized each month by SECURITYMADEIN.LU, the national agency promoting cybersecurity to businesses and administrations, which invites a partner to present their expertise on a particular topic. On May 14, 2019, we reached the number of 30 CSBs organized by SECURITYMADEIN.LU thanks to our partners! Last partners with whom we worked:
  • 3. AGENDA 8:30 Registration opens 9:00 Keynote by the sponsor 9:30 Roundtable 3 to 4 participants Moderation by SECURITMADEIN.LU 10:00 Conclusions and coffee Keynote speaker during the CSB28 (OpenField)
  • 4. 1ST STEP: DISCUSSION BETWEEN ORGANIZERS (SECURITYMADEIN.LU AND PARTNER) Basic information needed: 1. Contact of the organizer 2. Date of the event 3. Title of the event 4. Name of keynote speaker 5. Keynote title 6. Logo of the organizer (.ai and .jpg) Roundtable with MICROSOFT and MEPs
  • 5. 2ND STEP: ROUNDTABLE ORGANIZATION Discussion between SECURITYMADEIN.LU and the partner to establish the list of potential speakers. • 3 to 4 speakers with various point of view / background. The moderation is done by SECURITYMADEIN.LU Once the speakers are validated and available: • Publication of the agenda on SECURITYMADEIN.LU and C3 websites. • A call or meeting is organized the speakers, the organizer and SECURITYMADEIN.LU to talk about the topics that will be discuss.
  • 6. ORGANIZATIONAL DETAILS Finance: The partner pays for the rental of the Eternal Blue room for 50 people • € 1,520 excluding taxes half day (catering included) Registration Management: • The registration process is handle by SECURITYMADEIN.LU • In accordance with the GDPR, participant data is not shared with the partner unless they express their consent. • Invitation via Mailing 4 or 3 weeks before the event • The partner receives the invitation to share with its network