Please find below the conference program.
GREGORY DESCAMPS - Crisis & Business Continuity Senior Manager at GSK
In today's interconnected world, cyber attacks can have devastating effects on industrial operations, affecting people, the environment, assets and reputation. This session will focus on the crucial importance of putting in place robust continuity and crisis management plans before an attack occurs.
Cybercrime is on the rise. So much so that today, it's no longer a question of if a cyber attack will hit your company, but when. Questions you should be asking yourself: How would your organization cope with a major outage? What if it lasted more than a day? Are you equipped and able to get back to normal as quickly as possible? Find out how to limit the impact and get back to normal as quickly as possible.
Want to find out more about the conference?
Contact Chloé Martellota at the following address:
chloe.martellotta@f24.com
AI changed everything last year: who will now harness the power of new technologies and the psychology of human behavior more effectively - us or the cybercriminals? In our talk, we'll explore the biggest cybercrime trends and challenges that security teams are currently facing. But most importantly, we'll provide you with crucial and actionable security tips to help you efficiently improve your security approach in the long run.
How can you approach access management and security in the context of your cloud migration projects?
Every year, the Business Contintuity Institute (www.thebci.org) conducts a number of studies on the various aspects of continuity and resilience. Come and discover the latest trends synthesized in this presentation, which will report on what several hundred companies surveyed in Europe and around the world have experienced over the past year, and what the trends are for the future: evolving threats, solutions provided, changes in perception and paradigm... you'll come away with information and arguments that are essential for changing your company's cyber-security practices.
In a context where cybersecurity resources are limited and malicious actors are seizing on new must-have tools such as AI, companies and organizations face growing cybersecurity challenges. However, artificial intelligence can also be used to support security tools and operators, to facilitate their work in detection, incident response or vulnerability management. Fujitsu sheds light on these uses of AI in a cybersecurity context and their implementation.
OneLiiF, the bridge between patient & the healthcare ecosystem: improving the patient health journey & outcome
At OneLiif, our mission is to empower patients with seamless and secure access to their medical data, ensuring they have the ability to share vital health information with chosen professionals and caregivers. We strive to facilitate effective communication between patients and healthcare providers, enhancing the quality of care through our innovative, patient-friendly and centric platform.
Our commitment is to provide tools that enable patients to check medication interactions and symptoms in a medically approved manner, fostering a collaborative and informed healthcare journey.
This conference explores best practices in cybersecurity and regulatory compliance, with a focus on anonymization strategies.
data protection. Find out how to effectively protect personal data against the risk of leakage, while complying with legal requirements. We will
share innovative ways of securing, using and sharing your sensitive information, while guaranteeing its confidentiality.
This session will explore how to effectively quantify cyber risks in financial terms, helping organizations better understand, manage, and prioritize cybersecurity threats. Attendees will learn key risk management principles and techniques to translate technical risks into actionable, business-aligned insights.