Attend several demonstration sessions in a dedicated area!

Present every year at Les Assises de la cybersécurité, TechLab by Newlode is a multi-solution demonstration space dedicated to innovation and cutting-edge technologies in cybersecurity.

Le techlab by newlode Les Assises

The TechLab by Newlode allows guests to discover the latest technological advances, innovative solutions and live demonstrations of new tools for protecting against cyber threats. Attendees can interact with experts, attend technical presentations and explore cybersecurity scenarios in real time, encouraging the exchange of knowledge and the development of skills in a dynamic and collaborative environment.

Registrations can only be made via your personal space:

Register now

The TechLab by Newlode programme: coming soon

Behavioral Surveillance: How AI and Automation Are Compromising the "Legend" of the Spy Among Your Ranks

Overwhelmed by a constant stream of alerts, a typical SOC struggles to distinguish the insider from the thousands of mundane activities. AI, by constantly refining its model on user behavior, takes care of the removal of doubts and capitalizes on automation to isolate the smallest deviations and trigger the response at the first legitimate alert. In this workshop, we'll show how AI and automation can rethink your SOC to adapt to these new threats.

Technologies: SOC IA, Automatisation, RBA, UEBA
With Palo Alto, Mimecast, Netskope

  • Wednesday 8 October 3:00 pm
  • Thursday 9 October 10:00 am | 6:00 pm
  • Friday 10 October 10:00 am | 3:00 pm

 

CDR & ITDR: stopping a double-blind attack in the Cloud before it hits

In the face of increasingly stealthy cloud threats, relying solely on cloud detection (CDR) or identity security (ITDR) leaves critical blind spots. In this workshop, we will present a realistic hybrid attack scenario illustrating the limitations of each approach. Learn how correlating CDR and ITDR signals helps restore complete visibility and ensure an effective response.

Technologies: CDR, ITDR
With Wiz, CyberArk

  • Wednesday 8 October 3:00 pm
  • Thursday 9 October 10:00 am | 3:00 pm
  • Friday 10 October 10:00 am | 3:00 pm 

 

"Better safe than sorry": how to enhance your SOC's reactive defense with proactive protection through CTEM (VOC)

Every risk that is not detected early can turn into a time-consuming and costly investigation for your SOC team. The CTEM drastically reduces the number of vulnerabilities before they are exploited, reducing not only the number of incidents to be handled, but also the scale of those that reach the SOC. In this workshop, we will detail how CTEM and automation can reduce its attack surface to minimize incidents that happen to the SOC.

Technologies: VOC/CTEM
With Tenable, CyberArk

  • Wednesday 8 October 5:00 pm
  • Thursday 9 October 2:00 pm | 5:00 pm
  • Friday 10 October 2:00 pm

 

AI: from trusted ally to hidden trap – when its use turns against you

AI, now at the heart of business processes, can be misused to silently exfiltrate sensitive data or cause targeted DoS on your resources. These attacks take place directly in the AI runtime, where trust trumps vigilance. In this workshop, we'll show how to progressively harden your AI runtime: dependency auditing, execution controls, real-time instrumentation, and behavioral monitoring to counter these threats.

Technologies: AI Runtime, AI & LLM, Guardrails
With Palo Alto

  • Wednesday 8 October 4:00 pm
  • Thursday 9 October 11:00 am | 4:00 pm
  • Friday 10 October 4:00 pm

 

The secrets war has begun: defend your code!

An inadvertently exposed secret (SSH key, cloud token) can propagate into various artifacts (Docker images, npm packages) that become potential leak points until the secret is revoked. However, without unified visibility on all channels (Git, registries, logs, messaging), it becomes almost impossible to trace the chain to invalidate each occurrence. In this workshop, we will discuss how to gain visibility into these secrets and how to orchestrate when a voluntary or involuntary act breaks confidentiality.

Technologies : CI/CD, DevSecOps, Vault, Gestion des secrets
With CyberArk, Forcepoint

  • Wednesday 8 October 4:00 pm
  • Thursday 9 October 11:00 am | 4:00 pm
  • Friday 10 October 11:00 am | 4:00 pm

 

 

Zero Trust with shifting boundaries: why does it stop at the wrong perimeter?

Most organizations rigorously enforce Zero Trust for remote access while maintaining implicit trust on their internal networks, creating critical inconsistencies. This variable geometry approach exposes branches, campuses and inter-site connections to the risk of uncontrolled lateral movement. In this workshop, we will demonstrate how Universal ZTNA unifies continuous verification across all environments while micro-segmentation eliminates internal over-connectivity for a consistent end-to-end Zero Trust posture.

Technologies: ZTNA, Microsegmentation
With Netskope, Illumio

  • Wednesday 8 October 5:00 pm
  • Thursday 9 October 2:00 pm | 5:00 pm
  • Friday 10 October 2:00 pm