Lunch buffet. Lounge zone.
Data protection by a third party: Instruction for use.
The use of biometric data in information systems.
Non-technical aspects of secure development (SSDLC).
Hacking in your pocket: The best cases of the pentest of mobile applications.
Real security: From formality to sustainable protection. The role and value of expert consulting.
Conference opening. Plenary discussion: Finances under lock and key, from strategy to support.
Registration of participants. Welcome Coffee.