9the-Crime&Cybersecurity 2020 June 30, 2020 to June 30, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
In a digitalising world, you can’t mention fraud without cybercrime Yves Destrebecq Main threats overviewThe relationship between cybersecurity and the fight against fraudImplementation of an efficient dispositiveWhen ...
Education Seminar: How to defend against the most sophisticated attackers: A MULTI-STAGE LIVE CYBER-ATTACK Vincent Meysonnet Get inside the brains of the most sophisticated attackers and see how world-class defenders are ...
Education Seminar: Putting your users first: How security awareness training can protect your remote workforce against increasing cyber threats Theo Zafirakos Cyber security risks increase when companies adopt work from home practices with little time to ...
Increasing Work-from-home Capacity Beyond the Pandemic: How to Manage the Security Concerns Xavier Mell Despite the security concerns resulting from the recent increase in work-from-home initiatives, one-third of companies ...
Fighting hackers from your couch: 5 Things you should know! Joel Mollo COVID-19 has reshaped our lives as we know it, how has the current global situation ...
Education Seminar: How Bitsight takes into account the the new cyber-risks induced by Work From Home? Mick Leautey To understand some of the new risks created by the deployment of teleworking, Bitsight:Provides visibility ...
Education Seminar: Digital Risk Protection and Remote Working : Detect threats before they strike! Tom Sams Today, obtaining a comprehensive view and understanding of the threats that are specific to your ...
Executive Panel Discussion: "Protecting data in the New Normal" Amina Fortin For the majority of companies, digital transformation has been a gradual process over the past ...
5 things you need to know to future-proof your data security today Thomas Limpens Are you prepared for the threats your organization will face in the coming year?How will ...
A People-Centric Approach to Managing Insider Threats Gaëtan Gesret Anyone with legitimate, trusted access to an organization’s systems and data can become an Insider ...
Education Seminar: How to secure your company's remote workers and data access Valentin Jangwa The world has just observed a surge in remote workers in an era where remote ...
Executive Panel Discussion: "7 Lessons From Lockdown" Arnaud Martin , Vincent Nadjar COVID-19 has been a gamechanger for how businesses operate. It’s required standard operating procedures to ...