Predictive Security World - Predictive Technologies for Cybersecurity | September 24-26, 2018 – Marseille, France

2017 Program

DAY 1 – Monday Sept. 25 AFTERNOON
Security Automation World Smart Security Week Innovation Live
Keynotes & panels addressing transversal topics of the Smart Security Week conferences


DAY 2 – Tuesday Sept. 26
IoT Cybersecurity:
From Common Principles to Standards
All-day: Exhibition & Demos
Securing the IoT for the EntreprisE
Managing Cybersecurity in Business
Exhibition & Demos
Workshop by Darktrace
AI for Cyberdefense

DAY 1 - Monday September 25 Afternoon

2.00pm – 6.30pm: Opening Session | 3.50pm – 4.30pm: Coffee & Refreshment Break – Networking – Exhibition

Cooperative Cybersecurity for our Connected World
Chaired by: Jon Shamah, Chair of EEMA ; Principal Consultant, EJ Consultants, UK

Common to the co-located conferences forming Smart Security Week, the Grand Opening will give a global view of public and private Cybersecurity initiatives to forge a united response to cyber threats, from policies and regulations to PPP, from industry solutions to best practices. The European Union’s responses to cyber threats has paved the way to cooperative cybersecurity between Member States with the NIS Directive, cPPP, IoT “Trust Label”, Privacy, GDPR, eIDAS and a renewed cybersecurity framework in preparation. On the other side of the Atlantic, the US NIST’s Framework also aims to the convergence of cybersecurity responses. The recent development of these initiatives, and others from around the globe, will be presented and discussed in the first part of the Opening. The second part will focus on private sector cybersecurity responses with focuses on Digital Identity management and IoT security challenges.

Day 1
25 Sep 2017
Jon Shamah

Introduction: Keeping Safe in a Digitally Connected World

Part 1 – Large Scale Cybersecurity Initiatives Worldwide
Day 1
25 Sep 2017
Alar Streimann

Securing the Digital Society: e-Estonia Lessons

Slawomir Górniak

Cybersecurity Strategies in the EU

● Policies for cooperation at EU level: Cooperation and protection of infrastructure, Crisis management
● Emerging EU policy areas
● Strategies: Cooperation, Preparedness, Certification

James Clarke

Accelerating EU-US Dialogue in Cybersecurity and Privacy

● H2020 EU project AEGIS presentation: stimulating cooperation around cybersecurity
● EU-US Cybersecurity reflection on Research and Innovation
● EU-US Cybersecurity reflection on policy and legislation challenges in cybersecurity and privacy

Donna Dodson

US NIST Cybersecurity Framework 1.1: Achievements & Road Ahead (Title TBD)

Donna Dodson
James Clarke
Andrew Churchill
Claudio Caimi

PANEL DISCUSSION: Transatlantic Cybersecurity Cooperation: Forging an United Response to Universal Cyber Threats

Part 2 – Preparing to Cyber Attacks: Security Industry Responses to Protect Data, Assets and People
Day 1
25 Sep 2017
Helmut Scherzer

Reload the Responsible Internet Citizen

• Personal Identity Card with free Digital Signature
• Signature for Internet Communication
• Wiki-Reality
• Name the ‘dark side’ of the power
• Privacy Initiative
• Back to the responsible Citizen
• Reality Check

Dr. Detlef Houdeau

ECIL recommendations to EU Commission

European Cyber Security Leaders (ECIL): harmonization replace fragmentation, NIS2.0 should follow NIS, rapide action force is indicated, incentive for private actors to participate on security information sharing, recommendations for asset protection of SMEs in EEA, security algo based on guidelines from EU, staged security and mutual acceptance is needed, backdoor for illegal use must be prevented, EU regulatory sandboxing is recommended, new cyber security innovation via economic incentives.

Raghu K Dev

Cognitive Security and Threat Intelligence (Title TBD)

Patrice Slupowski

Future of Identity for a Global Connected World

• Life is becoming more digital so crime is following the trend
• With 15 connected objects for each user are we going to be physically hacked and harassed by things?
• Passwords are dead and new tools are absolutely required
• Privacy will become absolutely essential to protect our digital patrimony

Alain Ducass
Patrice Slupowski
Mohammed Murad
Michiel Loeff

PANEL DISCUSSION – Next Massive Attacks of Biometric Databases: Are We Ready?

Smart Security Week Innovation Live
2.00pm: Exhibition Opening

DAY 2 - Tuesday September 26

9.00am - 1.00pm: Break-out Sessions | 10.50 - 11.20am: Coffee & Refreshments Break – Networking – Exhibition

IoT Cybersecurity:
From Common Principles to Standards
(Joint with Connect Security World)
Session Chair: Dr. Gisela Meister, Head of Technology Consulting R&D, Standardisation Manager C-TO, Giesecke+Devrient, Germany
Day 1
26 Sep 2017
Dr. Gisela Meister

Cybersecurity Standards Challenges – Are the current standards ready to meet the EU regulations?

• Cybersecurity – Terms and Definitions
• Cybersecurity Strategy of the EU/E U Regulations and Action Plan
• Current international and European Standardisation Activities
• Challenges and Outlook

Francois Ennesser

IoT Security, a New Dimension for Cybersecurity

• oneM2M and IoT common requirements behind the diversity
• ICT driven “IoT 1.0” deployments: Privacy as a main driver for security
• Industry driven “IoT 2.0” deployments: Safety as the driver for security
• Combining physical world “real things” safety considerations with dynamic software based “cyber world” security approach

Salvatore Francomacaro

IoT, Blockchain, Mobile ID: Standardization efforts

• Security and Privacy in the Identity space
• Current IoT standardization efforts
• Blockchain encounters the ISO world
• Mobile ID and Driver License: the future of the eID

Naum Spaseski

Testing Security in oneM2M

• Standardized security in oneM2M
• Testing approach
• Conformance testing of security aspect

Securing the IoT for the Entreprise
(Joint with Connect Security World)
Session Chair: Dr. Gisela Meister, Head of Technology Consulting R&D, Standardisation Manager C-TO, Giesecke+Devrient, Germany
Day 1
26 Sep 2017
Janne Uusilehto

KEYNOTE How do I secure my IoT solution?

In this session, we’ll discuss IoT security as a global phenomenon and cover some of its specific characteristics. Particular focus will be on what steps industry players can take when building IoT solutions and how Microsoft Azure can help make their IoT businesses more successful. Additional topics will include relevant IoT security standards, certifications, identifying key players in IoT end-to-end systems, and what kinds of help are available for businesses interested in building robust IoT solutions on a global scale.

Martin Wimmer

Blueprints for Industrial IoT Security

• Industrial IoT (IIoT) and Operational Technology (OT) provide distributed systems. Distributed system security has a long history.
• Well-known security mechanisms address other domains e.g. Web applications accessed by humans.
• IIoT and OT demand new as well as adopted security mechanisms/solutions
• No single, one-fits-all solution for IIoT/OT security will emerge but there can be common blueprints

Sylvain Barbeau

Product Security in Complex System Engineering

• Most of security concepts and regulation come from IT world. Challenge: transpose to flight ready industrial objects,
• Novelty : apply security concepts and technologies to entire system engineering,
• Interest : “inject” complex system engineering process with security, return of experience

1.00 – 2.00pm: Lunch – Networking – Exhibition
2.00 – 6.45pm: Break-out Sessions | 3.50 – 4.30pm: Coffee & Refreshments Break – Networking – Exhibition

Managing Cybersecurity in Business
(Joint with World e-ID and Cybersecurity)
Session Chair: Sławomir Górniak, Data Security & Standardization Unit, ENISA – European Union Agency for Network and Information Security
Day 1
26 Sep 2017
Emmanuel Meriot

KEYNOTE The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defence

● How new machine learning and mathematics are automating advanced cyber defence
● Why 100% network visibility allows you to detect threats as they happen, or before they happen
● How smart prioritisation and visualization of threats allows for better resource allocation and lower risk
● Real-world examples of unknown threats detected by ‘immune system’ technology”

Mark Hearn

Inside the Mind of a Hacker: Knowledge is Cybersecurity Power

● Security shouldn’t be treated as a check box
● How hackers operate, what they are after and how they gain access despite security measures
● Making difficult to exploit vulnerabilities from IoT services and connectivity
● Implementing a proper cybersecurity approach

Gerd Pflueger

The Mobile Security & Identity Management Collision

● When mobility and identity collide: with the rise of IoT, more mobile devices are being used for authentication
● The new identity management model in light of IoT
● How businesses can drive digital transformation securely without compromise between mobility and security

Aljosa Pasic

WATIFY: Awareness Campaign for the Modernisation of Europe’s Industry

Workshop by
Day 1
26 Sep 2017
Jerome Chapolard

WORKSHOP: AI for Cyberdefense: Shifting to Full Automation from Detection to Reaction

Gala Dinner – End of the Conference