Luxembourg 2025 conferences

08:30 - 09:00: Coffee reception

AI is transforming cybersecurity and improving CISOs' peace of mind. Advances in threat detection, incident response and proactive risk management enable CISOs to focus on comprehensive, innovative security strategies. By automating repetitive tasks and providing predictive analytics, AI contributes to a more secure digital environment and enables CISOs to sleep soundly at night.

Luc COTTIN - CEO Rsecure and CISO of the Year 2024

The presentation will focus on the simulation of a cyber security crisis. This will illustrate the application of DORA provisions in a concrete case.
DORA regulations formalize cybersecurity and operational resilience requirements, with a focus on IT risk management for financial entities. Implementing DORA-compliant security measures will strengthen the resilience of financial institutions.

Jean-Louis Reynaert, cyber risk management expert, Grace Connect

See Conference

Feeling overwhelmed by the new NIS2 and DORA regulations? You're not alone. These critical measures aim to strengthen cybersecurity across essential service providers, but achieving compliance can be a complex challenge. Join this insightful seminar to discover how MDR can be your powerful ally!

We'll explore how MDR services can streamline your path to compliance. Empower yourself with the knowledge to:
- Navigate the evolving regulatory landscape of NIS2 and DORA
- Leverage MDR to gain a significant advantage in achieving and maintaining compliance
- Ensure the digital resilience of your organization in the face of ever-growing cyber threats

Join us and take a proactive step towards a more secure future!

Ron Mukherjee - Cybersecurity specialist - ESET BeLux / MGK

European regulations like DORA, NIS-2, and CER (but also CSRD) represent a severe workload, but also a significant opportunity toward a more integrated approach to resilience, combining cybersecurity, continuity, and operational risk management.

Organizations that embrace a holistic approach will not only achieve compliance but also strengthen their ability to thrive amid disruption.

Let's explore together some practical cases and takeaways from the field and review new trends for 2025 regarding threats and risks on corporate resilience.

Christian DE BOECK - Director - Synergit

See the conference

Cyberthreats are nearly as pervasive as the air we breathe. No business is immune from the possibility of an attack. That's why network threat detection & response (NDR) is so vital.
And today Advanced NDR is Imperative: Acceleration of cloud adoption, the shift to remote work, BYOD & IoT devices make end-through-end network visibility all the more difficult to achieve.
Discover how Packet-based NDR solutions provide the comprehensive network visibility needed to detect threats effectively.

Ward Van Laer - Senior Sales Engineer - NETSCOUT

See Conference

 During the presentation, we will explore the challenges and best practices of data anonymization, highlighting that there is no universal solution. An effective anonymization process must be structured and adaptive to protect user privacy while preserving data utility. 

Alain Hirtzig - Head of CyberLabs at POST Luxembourg

How to prioritize CVE vulnerabilities with the 3D method (CVSS-BTE + EPSS + CERT data)?

80 new vulnerabilities are published on a daily basis in the CVE database. The challenge is no longer to know if your information system is vulnerable, but to identify which CVEs really deserve your attention. In this presentation, we'll look at how and why should we use 3 modern indicators to better manage and prioritize CVEs from day to day: CVSS, EPSS (probability of exploitation of a CVE), and the presence of a vulnerability in the CISA KEV or CERTFR-ALE catalogs (US and FR authorities).

Maxime ALAY-EDDINE - Cyberwatch & Galeax Co-Founder - Galeax

Moderator Fabrice Hecquet, CEO of CyberXpert