Attend several demonstration sessions in a dedicated area!
Present every year at Les Assises de la cybersécurité, TechLab by Newlode is a multi-solution demonstration space dedicated to innovation and cutting-edge technologies in cybersecurity.

The TechLab by Newlode allows guests to discover the latest technological advances, innovative solutions and live demonstrations of new tools for protecting against cyber threats. Attendees can interact with experts, attend technical presentations and explore cybersecurity scenarios in real time, encouraging the exchange of knowledge and the development of skills in a dynamic and collaborative environment.
Registrations can only be made via your personal space from 7 July 2025:
The TechLab by Newlode programme
Behavioral Surveillance: How AI and Automation Are Compromising the "Legend" of the Spy Among Your Ranks
Overwhelmed by a constant stream of alerts, a typical SOC struggles to distinguish the insider from the thousands of mundane activities. AI, by constantly refining its model on user behavior, takes care of the removal of doubts and capitalizes on automation to isolate the smallest deviations and trigger the response at the first legitimate alert. In this workshop, we'll show how AI and automation can rethink your SOC to adapt to these new threats.
Technologies: SOC IA, Automatisation, RBA, UEBA
With Palo Alto, Mimecast, Netskope
- Wednesday 8 October 3:00 pm
- Thursday 9 October 10:00 am | 6:00 pm
- Friday 10 October 10:00 am | 3:00 pm
CDR & ITDR: stopping a double-blind attack in the Cloud before it hits
In th face ofincreasingly stealthy cloud threats, relying solely on cloud detection (CDR) or identity security (ITDR) leaves critical blind spots. In this workshop, we will present a realistic hybrid attack scenario illustrating the limitations of each approach. Learn how correlating CDR and ITDR signals helps restore complete visibility and ensure an effective response.
Technologies: CDR, ITDR
With Wiz, CyberArk
- Wednesday 8 October 3:00 pm
- Thursday 9 October 10:00 am | 3:00 pm
- Friday 10 October 10:00 am | 3:00 pm
“Prevention is better than cure”: reduce SOC alerts through proactive protection with CTEM
Is your SOC drowning in useless alerts, limiting your ability to react effectively to real threats? Discover how the proactive approach of CTEM (Continuous Threat Exposure Management), supported by a VOC (Vulnerability Operating Center), effectively complements your SOC strategy by reducing your upstream attack surface. This lab demonstrates in concrete terms how to anticipate incidents to lighten the load on analysts ... because too many alerts kill the alert! Leave with the keys to preventive, effective and sustainable cybersecurity.
Technologies: VOC/CTEM
With Tenable, CyberArk
- Wednesday 8 October 5:00 pm
- Thursday 9 October 2:00 pm | 5:00 pm
- Friday 10 October 2:00 pm
AI: from trusted ally to hidden trap – when its use turns against you
AI, now at the heart of business processes, can be misused to silently exfiltrate sensitive data or cause targeted DoS on your resources. These attacks take place directly in the AI runtime, where trust trumps vigilance. In this workshop, we'll show how to progressively harden your AI runtime: dependency auditing, execution controls, real-time instrumentation, and behavioral monitoring to counter these threats.
Technologies: AI Runtime, AI & LLM, Guardrails
With Palo Alto
- Wednesday 8 October 4:00 pm
- Thursday 9 October 11:00 am | 4:00 pm
- Friday 10 October 4:00 pm
The war of secrets is on: defend your code!
Are your developers your weakest link?
Copying a secret into a local file, sharing it in a chat, mistakenly pushing it into Git... all it takes is a harmless gesture to compromise your entire CI/CD chain. This lab highlights the risky behaviors that expose your secrets in artifacts, repositories, pipelines or runtime environments. Discover how to regain control with unified visibility and automated end-to-end remediation, before a simple oversight becomes a critical breach.
Technologies : CI/CD, DevSecOps, Vault, Gestion des secrets
With CyberArk, Forcepoint
- Wednesday 8 October 4:00 pm
- Thursday 9 October 11:00 am | 4:00 pm
- Friday 10 October 11:00 am | 4:00 pm
Zero Trust with shifting boundaries: why does it stop at the wrong perimeter?
Most organizations rigorously enforce Zero Trust for remote access while maintaining implicit trust on their internal networks, creating critical inconsistencies. This variable geometry approach exposes branches, campuses and inter-site connections to the risk of uncontrolled lateral movement. In this workshop, we will demonstrate how Universal ZTNA unifies continuous verification across all environments while micro-segmentation eliminates internal over-connectivity for a consistent end-to-end Zero Trust posture.
Technologies: ZTNA, Microsegmentation
With Netskope, Illumio
- Wednesday 8 October 5:00 pm
- Thursday 9 October 2:00 pm | 5:00 pm
- Friday 10 October 2:00 pm