SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
PRIVACY
RIVACY
BREACH
BREACH
CLOUD
CLOUD
TECHNOLOGY
RISK
THREATS
PEOPLE
PEOPLE
EXPLOITS
PROCESS
PROACTIVE MONITORIN
ORGANISED CRIME
IDENTITY
ENCRYPTION
ENCRYPTION
SPEAR PHISHING
SOCIAL MEDIA
MALWARE
MALWARE
NATION STATE
UNAUTHORISED ACCESSCONNECTIVITY
INFORMATION SECURITY
CYBER ATTACKS
NTERNET OF THINGS
CONSUMER
TECHNOLOGY
CRITICAL ASSET
THREAT INTELLIGENCE
THREAT INTELLIGEN
HACKTIVIST
MOBILE
PHYSICAL SECURITY
ADVERSARIES
DIGITAL
ECONOMY
NETWORKS
ECOSYSTEM
NFORMATION TECHNOLOGY
PwC Cyber Security Day
Discover the latest key trends and proven
next generation solutions in Cyber Security
PRIVACY
CLOUD
CLOUD
EOPLE
PROACTIVE MONITORIN
ORGANISED CRIME
MALWARE
NATION STATE
INFORMATION SECURITY
CYBER ATTACKS
NTERNET OF THINGS
CRITICAL ASSET
THREAT INTELLIGENCE
THREAT INTELLIGEN
HACKTIVIST
OUTSIDE IN
ADVERSARIES
ECOSYSTEM
NFORMATION TECHNOLOGY
18 October 2016
Crystal Park - Luxembourg
#cyberseclu
Agenda
08:30 - 09:00 Welcome and registration
09:00 - 09:10 Introduction and welcome words
Laurent Probst – Network Global Leader, PwC’s Accelerator
Vincent Villers – Cyber Security Leader, PwC Luxembourg
09:10 - 09:30 Cybersecurity, a strategic interest for Luxembourg
Francine Closener – Secretary of State for the Economy,
Secretary of State for Internal Security, Secretary of State for Defence
09:30 - 09:45 The ESA initiative on Cyber Security for Space
Luca del Monte – ESA Space Economy Manager
09:45 - 10:00 Cybersecurity: standing still is not an option!
François Lavaste – Head of CyberSecurity, Airbus DS
10:00 - 10:20 The Global State of Information Security® 2017 (GSISS) – Key findings
Vincent Villers – Cyber Security Leader, PwC Luxembourg
10:20 - 10:40 Break
10:40 - 10:55 Jury presentation
Introduced by Cyrille Foillard – Managing Director – PwC’s Accelerator
Robert Bielecki – Executive Consultant, LuxTrust
Maxime Clementz – Ethical hacker & Cyber Security Manager, PwC Luxembourg
Rodolphe Mans – President, CPSI (Collège des Professionnels de la Sécurité de l’Information)
Carlos Ramón – Founder and Managing Partner, COMPAS Advisory
Dennis Smith – Managing Partner and Founder, Evolution Equity Partners
Pierre Zimmer – Deputy Managing Director, POST
10:55 - 13:00 Ten Cyber Security next-generation solutions companies on stage
Introduced by Cyrille Foillard – Managing Director – PwC’s Accelerator
13:00 - 14:30 Match Making lunch
PRIVACY
BREACH
DETECT
OPERATION
CLOUD
RISK
MPACT CRITICAL INFRASTRUCTURE
PEOPLE
PEOPLE
PROCESS
ENCRYPTION
MALWARE
NATION STATE
CONNECTIVITY
CRISTHREAT
NTERNET OF THINGS
THREAT INTELLIGENCE
MOBILE
ADVERSARIES
DIGITAL
ECONOMY
NETWORKS
ECOSYSTEM
VULNERABILITIES
NFORMATION TECHN
14:30 - 15:30 Breakout sessions
1
The latest trends in cyberattacks:
Technology Watch from PwC Lu’s Ethical Hackers
Both traditional and new media are increasing their coverage of cyberattacks, and the number of
reported breaches and victims keeps growing. Cybercrime is a real and fast-growing concern for
companies across all industries, but the amount of available information has reached impractical levels.
However, there is a lot to learn from these events.
This breakout session is aimed at updating you on the most significant and latest cyberattack trends that
our team of Ethical Hackers has observed in the past year.
Moderator:
Maxime Clementz – Ethical hacker & Cyber Security Manager, PwC Luxembourg
2
Game of Threats™
Game of Threats™ is a digital game designed to simulate the speed and complexity of an actual cyber-
breach. Our game forces players to make choices about how to attack (if playing the threat) and defend
(if playing the company) with limited information and to balance investment between capability and
responding to the other team’s actions and plans.
Moderator:
Vincent Villers – Cyber Security Leader, PwC Luxembourg
3
New European Public-Private Partnership in the area of cybersecurity, industrial
research and industry.
A few months ago, the European Commission launched a new public-private partnership on
cybersecurity that is expected to trigger €1.8 billion of investment by 2020. This is part of a series of
new initiatives to better equip Europe against cyberattacks and to strengthen the competitiveness of its
cybersecurity sector.
Today’s action plan includes the launch of the first European public-private partnership on cybersecurity.
The EU will invest €450 million in this partnership as part of Horizon 2020, its research and innovation
programme. Cybersecurity market players, represented by the European Cyber Security Organisation
(ECSO), are expected to invest three times as much. This partnership will also include members from
national, regional and local public administrations, research centres and academia. The aim of the
partnership is to foster cooperation in the early stages of the research and innovation process and to
build cybersecurity solutions for various sectors, such as energy, health, transport and finance.
This breakout session will be an opportunity to obtain more information on this initiative and will help
you understand the benefit it can bring you.
Moderator:
François Lavaste – Head of CyberSecurity at Airbus DS, First Director of ESCO (European Cyber Security
Organisation) and board member (General Secretary) of ACN (Alliance pour la Confiance du Numérique)
Agenda
PRIVACY
BREACH
BREACH
NAL TECHNOLO
CLOUD
CLOUD
TECHNOLOGY
EXPLOITS
PROACTIVE MONITORING
ORGANISED CRIME
ENCRYPTION
SPEAR PHISHING
SOCIAL MEDIA
MALWARE
UNAUTHORISED ACCESS
COUNTERMEASURES
INFORMATION SECURITY
CYBER ATTACKS
SIS RESPONSE
CONSUMER
TECHNOLOGY
CRITICAL ASSETS
THREAT INTELLIGENCE
HACKTIVISTS
PHYSICAL SECURITY
OUTSIDE IN
PREVENT
S
NOLOGY
4 Key findings from the “Out of the shadows: CISO in the spotlight!” survey and open
discussion – CISO’S role and responsibilities
The CPSI (Collège des Professionnels de la Sécurité de l’Information) and PwC would like to share with
you the results of their joint survey, “Out of the shadows: CISO in the spotlight!”
Conducted in May 2016, this survey aims at analysing the roles and responsibilities of CISOs in
Luxembourg to get an overview of the current situation.
Moderator:
Rodolphe Mans – President, CPSI (Collège des Professionnels de la Sécurité de l’Information)
Ludovic Raymond – Cyber Security Director, PwC Luxembourg
5 Match Making session
Want to discover how the companies in the Local to Global competition are shaping future trends?
Curious about how they can bring value to your organisation? If you’re interested in meeting some of
the entrepreneurs presenting during the event, seize the opportunity during this hour to meet them and
share experiences.
15:30 - 15:50 Break
15:50 - 16:35 Risks & opportunities in the cyberspace
Guy-Philippe Goldstein – Senior Analyst on the Cyberdesk, Wikistrat – Contributor to Military &
Strategic Affairs (INSS)
16:35 - 17:40 Panel discussion: Cyber Security – A growth engine for developing the economy
Moderator:
Vincent Villers – Cyber Security Leader, PwC Luxembourg
Panellists:
Robert Bielecki – Executive Consultant, LuxTrust
Guy-Philippe Goldstein – Senior Analyst on the Cyberdesk, Wikistrat – Contributor to Military &
Strategic Affairs (INSS)
Francois Lavaste – Head of CyberSecurity, Airbus DS
Dennis Smith – Managing Partner and Founder, Evolution Equity Partners
Pascal Steichen – CEO, Security made in Lëtzebuerg g.i.e.
Yoav Tzruya – Partner, Jerusalem Venture Partners
17:40 - 17:50 Awards Ceremony
17:50 - 18:00 Conclusion
Laurent Probst – Network Global Leader, PwC’s Accelerator
Vincent Villers – Cyber Security Leader, PwC Luxembourg
As from 18:00 Networking drinks reception
Agenda

Contenu connexe

Tendances

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
at MicroFocus Italy ❖✔
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
Kayisa Herman Dube
 

Tendances (18)

Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Security Concerns and International Relations
Security Concerns and International RelationsSecurity Concerns and International Relations
Security Concerns and International Relations
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIESEIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
EIOPA: CYBER RISKS FOR INSURERS-CHALLENGES AND OPPORTUNITIES
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 

Similaire à Agenda PWC Cybersecurity Day - 18 octobre 2016

Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
TopCyberNewsMAGAZINE
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
Rhys A. Mossom
 

Similaire à Agenda PWC Cybersecurity Day - 18 octobre 2016 (20)

European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-RoundtableTMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
TMHCC in Risk & Compliance 2017 Q4 - Cyber Mini-Roundtable
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdf
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer Magazine
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 

Plus de ITnation Luxembourg (7)

Devoteam-résultats financiers 2015
Devoteam-résultats financiers 2015Devoteam-résultats financiers 2015
Devoteam-résultats financiers 2015
 
Les qualifications de demain dans les TIC2016
Les qualifications de demain dans les TIC2016Les qualifications de demain dans les TIC2016
Les qualifications de demain dans les TIC2016
 
Careers it by VMware
Careers it by VMwareCareers it by VMware
Careers it by VMware
 
vmware-cloud-careers-infographic
vmware-cloud-careers-infographicvmware-cloud-careers-infographic
vmware-cloud-careers-infographic
 
security ddos summary
security ddos summarysecurity ddos summary
security ddos summary
 
agenda-2014
agenda-2014agenda-2014
agenda-2014
 
Post luxembourg présentation
Post luxembourg présentationPost luxembourg présentation
Post luxembourg présentation
 

Dernier

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 

Dernier (17)

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 

Agenda PWC Cybersecurity Day - 18 octobre 2016

  • 1. PRIVACY RIVACY BREACH BREACH CLOUD CLOUD TECHNOLOGY RISK THREATS PEOPLE PEOPLE EXPLOITS PROCESS PROACTIVE MONITORIN ORGANISED CRIME IDENTITY ENCRYPTION ENCRYPTION SPEAR PHISHING SOCIAL MEDIA MALWARE MALWARE NATION STATE UNAUTHORISED ACCESSCONNECTIVITY INFORMATION SECURITY CYBER ATTACKS NTERNET OF THINGS CONSUMER TECHNOLOGY CRITICAL ASSET THREAT INTELLIGENCE THREAT INTELLIGEN HACKTIVIST MOBILE PHYSICAL SECURITY ADVERSARIES DIGITAL ECONOMY NETWORKS ECOSYSTEM NFORMATION TECHNOLOGY PwC Cyber Security Day Discover the latest key trends and proven next generation solutions in Cyber Security PRIVACY CLOUD CLOUD EOPLE PROACTIVE MONITORIN ORGANISED CRIME MALWARE NATION STATE INFORMATION SECURITY CYBER ATTACKS NTERNET OF THINGS CRITICAL ASSET THREAT INTELLIGENCE THREAT INTELLIGEN HACKTIVIST OUTSIDE IN ADVERSARIES ECOSYSTEM NFORMATION TECHNOLOGY 18 October 2016 Crystal Park - Luxembourg #cyberseclu Agenda 08:30 - 09:00 Welcome and registration 09:00 - 09:10 Introduction and welcome words Laurent Probst – Network Global Leader, PwC’s Accelerator Vincent Villers – Cyber Security Leader, PwC Luxembourg 09:10 - 09:30 Cybersecurity, a strategic interest for Luxembourg Francine Closener – Secretary of State for the Economy, Secretary of State for Internal Security, Secretary of State for Defence 09:30 - 09:45 The ESA initiative on Cyber Security for Space Luca del Monte – ESA Space Economy Manager 09:45 - 10:00 Cybersecurity: standing still is not an option! François Lavaste – Head of CyberSecurity, Airbus DS 10:00 - 10:20 The Global State of Information Security® 2017 (GSISS) – Key findings Vincent Villers – Cyber Security Leader, PwC Luxembourg 10:20 - 10:40 Break 10:40 - 10:55 Jury presentation Introduced by Cyrille Foillard – Managing Director – PwC’s Accelerator Robert Bielecki – Executive Consultant, LuxTrust Maxime Clementz – Ethical hacker & Cyber Security Manager, PwC Luxembourg Rodolphe Mans – President, CPSI (Collège des Professionnels de la Sécurité de l’Information) Carlos Ramón – Founder and Managing Partner, COMPAS Advisory Dennis Smith – Managing Partner and Founder, Evolution Equity Partners Pierre Zimmer – Deputy Managing Director, POST 10:55 - 13:00 Ten Cyber Security next-generation solutions companies on stage Introduced by Cyrille Foillard – Managing Director – PwC’s Accelerator 13:00 - 14:30 Match Making lunch
  • 2. PRIVACY BREACH DETECT OPERATION CLOUD RISK MPACT CRITICAL INFRASTRUCTURE PEOPLE PEOPLE PROCESS ENCRYPTION MALWARE NATION STATE CONNECTIVITY CRISTHREAT NTERNET OF THINGS THREAT INTELLIGENCE MOBILE ADVERSARIES DIGITAL ECONOMY NETWORKS ECOSYSTEM VULNERABILITIES NFORMATION TECHN 14:30 - 15:30 Breakout sessions 1 The latest trends in cyberattacks: Technology Watch from PwC Lu’s Ethical Hackers Both traditional and new media are increasing their coverage of cyberattacks, and the number of reported breaches and victims keeps growing. Cybercrime is a real and fast-growing concern for companies across all industries, but the amount of available information has reached impractical levels. However, there is a lot to learn from these events. This breakout session is aimed at updating you on the most significant and latest cyberattack trends that our team of Ethical Hackers has observed in the past year. Moderator: Maxime Clementz – Ethical hacker & Cyber Security Manager, PwC Luxembourg 2 Game of Threats™ Game of Threats™ is a digital game designed to simulate the speed and complexity of an actual cyber- breach. Our game forces players to make choices about how to attack (if playing the threat) and defend (if playing the company) with limited information and to balance investment between capability and responding to the other team’s actions and plans. Moderator: Vincent Villers – Cyber Security Leader, PwC Luxembourg 3 New European Public-Private Partnership in the area of cybersecurity, industrial research and industry. A few months ago, the European Commission launched a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. This is part of a series of new initiatives to better equip Europe against cyberattacks and to strengthen the competitiveness of its cybersecurity sector. Today’s action plan includes the launch of the first European public-private partnership on cybersecurity. The EU will invest €450 million in this partnership as part of Horizon 2020, its research and innovation programme. Cybersecurity market players, represented by the European Cyber Security Organisation (ECSO), are expected to invest three times as much. This partnership will also include members from national, regional and local public administrations, research centres and academia. The aim of the partnership is to foster cooperation in the early stages of the research and innovation process and to build cybersecurity solutions for various sectors, such as energy, health, transport and finance. This breakout session will be an opportunity to obtain more information on this initiative and will help you understand the benefit it can bring you. Moderator: François Lavaste – Head of CyberSecurity at Airbus DS, First Director of ESCO (European Cyber Security Organisation) and board member (General Secretary) of ACN (Alliance pour la Confiance du Numérique) Agenda
  • 3. PRIVACY BREACH BREACH NAL TECHNOLO CLOUD CLOUD TECHNOLOGY EXPLOITS PROACTIVE MONITORING ORGANISED CRIME ENCRYPTION SPEAR PHISHING SOCIAL MEDIA MALWARE UNAUTHORISED ACCESS COUNTERMEASURES INFORMATION SECURITY CYBER ATTACKS SIS RESPONSE CONSUMER TECHNOLOGY CRITICAL ASSETS THREAT INTELLIGENCE HACKTIVISTS PHYSICAL SECURITY OUTSIDE IN PREVENT S NOLOGY 4 Key findings from the “Out of the shadows: CISO in the spotlight!” survey and open discussion – CISO’S role and responsibilities The CPSI (Collège des Professionnels de la Sécurité de l’Information) and PwC would like to share with you the results of their joint survey, “Out of the shadows: CISO in the spotlight!” Conducted in May 2016, this survey aims at analysing the roles and responsibilities of CISOs in Luxembourg to get an overview of the current situation. Moderator: Rodolphe Mans – President, CPSI (Collège des Professionnels de la Sécurité de l’Information) Ludovic Raymond – Cyber Security Director, PwC Luxembourg 5 Match Making session Want to discover how the companies in the Local to Global competition are shaping future trends? Curious about how they can bring value to your organisation? If you’re interested in meeting some of the entrepreneurs presenting during the event, seize the opportunity during this hour to meet them and share experiences. 15:30 - 15:50 Break 15:50 - 16:35 Risks & opportunities in the cyberspace Guy-Philippe Goldstein – Senior Analyst on the Cyberdesk, Wikistrat – Contributor to Military & Strategic Affairs (INSS) 16:35 - 17:40 Panel discussion: Cyber Security – A growth engine for developing the economy Moderator: Vincent Villers – Cyber Security Leader, PwC Luxembourg Panellists: Robert Bielecki – Executive Consultant, LuxTrust Guy-Philippe Goldstein – Senior Analyst on the Cyberdesk, Wikistrat – Contributor to Military & Strategic Affairs (INSS) Francois Lavaste – Head of CyberSecurity, Airbus DS Dennis Smith – Managing Partner and Founder, Evolution Equity Partners Pascal Steichen – CEO, Security made in Lëtzebuerg g.i.e. Yoav Tzruya – Partner, Jerusalem Venture Partners 17:40 - 17:50 Awards Ceremony 17:50 - 18:00 Conclusion Laurent Probst – Network Global Leader, PwC’s Accelerator Vincent Villers – Cyber Security Leader, PwC Luxembourg As from 18:00 Networking drinks reception Agenda