IT Security Summit
Securing Business in an Age of Uncertainty
Cyber disruption, digital sovereignty, and leadership when it matters most
The IDC Security Summit France is the flagship annual event for CISOs, CIOs, security leaders, and executive decision-makers confronting a rapidly escalating cyber threat landscape.
As geopolitical friction intensifies, technology supply chains grow more complex, and regulatory demands expand, cybersecurity has moved beyond the IT function. It now sits firmly at the core of enterprise strategy – shaping sovereignty, resilience, and executive accountability.
In 2026, the Summit will unveil a fully immersive, scenario-based experience built around a high-impact cyber crisis simulation. Designed to reflect real-world dynamics, the format will challenge leaders to make critical decisions under pressure – balancing operational continuity, reputation, compliance, and stakeholder trust in real time.
More than a technology conference, the Summit explores what it truly takes to lead through crisis: clarity in uncertainty, coordination across functions, and the endurance to respond to sustained and increasingly credible attacks.
Strategic Context
According to IDC, cybersecurity is being fundamentally reshaped by the convergence of geopolitics and artificial intelligence.
By 2027:
-
One-third of governments will mandate sovereign AI strategies in sensitive sectors.
-
80% of organizations will be exposed to phishing campaigns powered by AI-generated synthetic identities.
At the same time, AI-augmented threats are accelerating in scale and sophistication. Deepfakes, voice cloning, manipulated digital evidence, attacks targeting AI models, and the uncontrolled spread of “shadow AI” are dramatically increasing operational complexity and cognitive overload for security teams.
In this context, the IDC Security Summit France provides senior leaders with forward-looking insights, strategic benchmarks, and practical frameworks to reinforce digital sovereignty, strengthen enterprise resilience, and enhance executive decision-making in high-pressure environments.
IDC 2027 Forecast
By 2027, 80% of organizations will encounter phishing attacks using synthetic AI-generated identities. These highly credible and hard-to-detect attacks will escalate pressure on security teams and complicate incident management on technical, psychological, and managerial levels. AI-driven threats, including deepfakes, voice fraud, and content manipulation, will make rapid, effective response increasingly critical for resilient operations.
Our speakers
Thibaut Roynette
Event Sessions
One Day Event 9:20 am
Panel #1 – Souveraineté numérique vs réalité économique: un dilemme insoluble?
Regards croisés sur les arbitrages stratégiques entre souveraineté numérique et contraintes économiques.
Thibaut Roynette, RSSI, Danone
- Arbitrages entre souveraineté et performance économique
- Dépendances technologiques et choix stratégiques
- Trajectoires vers une autonomie réaliste
Pierre Kochanski, RSSI, Ministère de l’Économie et des Finances
- Contraintes géopolitiques et réglementaires
- Tensions entre compétitivité et sécurité
- Cadre normatif et souveraineté nationale
Suvansh Lal, RSSI, Equans France
- Réalité économique des grands groupes
- Impacts des dépendances sur les décisions stratégiques
- Pistes concrètes vers plus d’autonomie
Pierre Kochanski
Directeur Coordination des Technologies de l’Information
MINISTERE ECONOMIES ET FINANCES
Read bio
Pierre Kochanski
Event Sessions
One Day Event 9:20 am
Panel #1 – Souveraineté numérique vs réalité économique: un dilemme insoluble?
Regards croisés sur les arbitrages stratégiques entre souveraineté numérique et contraintes économiques.
Thibaut Roynette, RSSI, Danone
- Arbitrages entre souveraineté et performance économique
- Dépendances technologiques et choix stratégiques
- Trajectoires vers une autonomie réaliste
Pierre Kochanski, RSSI, Ministère de l’Économie et des Finances
- Contraintes géopolitiques et réglementaires
- Tensions entre compétitivité et sécurité
- Cadre normatif et souveraineté nationale
Suvansh Lal, RSSI, Equans France
- Réalité économique des grands groupes
- Impacts des dépendances sur les décisions stratégiques
- Pistes concrètes vers plus d’autonomie
Vincent Gapaillard
Event Sessions
One Day Event 11:40 am
Gérer la crise cyber: quand le board entre dans la salle de guerre
Retour d’expérience concret sur la gestion d’une crise cyber, de la war room jusqu’au board.
Vincent Gapaillard, RSSI, Loxam
- Rôle du RSSI en situation de crise
- Interactions avec le board sous pression
- Dynamiques de décision en war room
- Enseignements clés issus de son expérience
Eugénie Laurian
Experte I Stratégie en sécurité numérique: cybersécurité et protection des données
MINISTERE DES ARMEES
Read bio
Eugénie Laurian
Event Sessions
One Day Event 2:20 pm
RSSI et souveraineté numérique : de la contrainte technique à l’autonomie stratégique
Retour d’expérience et prise de hauteur sur le rôle croissant du RSSI face aux enjeux de souveraineté numérique, autour des dépendances technologiques, de l’évolution de la fonction et du positionnement stratégique vis-à-vis des directions générales.
Suvansh Lal
Event Sessions
One Day Event 9:20 am
Panel #1 – Souveraineté numérique vs réalité économique: un dilemme insoluble?
Regards croisés sur les arbitrages stratégiques entre souveraineté numérique et contraintes économiques.
Thibaut Roynette, RSSI, Danone
- Arbitrages entre souveraineté et performance économique
- Dépendances technologiques et choix stratégiques
- Trajectoires vers une autonomie réaliste
Pierre Kochanski, RSSI, Ministère de l’Économie et des Finances
- Contraintes géopolitiques et réglementaires
- Tensions entre compétitivité et sécurité
- Cadre normatif et souveraineté nationale
Suvansh Lal, RSSI, Equans France
- Réalité économique des grands groupes
- Impacts des dépendances sur les décisions stratégiques
- Pistes concrètes vers plus d’autonomie
Bruno Durand
Event Sessions
One Day Event 10:05 am
Partner Keynote- Sophos
Sécurité, résilience et continuité : faire face à des menaces de plus en plus systémiques
Duncan Brown
Duncan Brown is associate vice president, European Security Practice, at IDC EMEA and leads the firm’s security research program in Europe. He specializes in providing strategic advice to his clients, informing and validating their corporate, product, and marketing plans. Brown is an expert in analyzing the security market globally, and his list of security-related clients includes enterprises, central banks, government organizations, and security product suppliers and services providers. Brown’s expertise spans the gamut of security topics including incident response, threat intelligence, and global privacy issues. He established and leads IDC’s coverage of the global impact of the GDPR, the RPEC (ePrivacy Directive update) and NIS Directive on technology companies and their customers. His analysis and opinions are widely sought by industry leaders and investors, while his comments on industry trends and developments frequently appear in the leading business and trade publications.
You can find Duncan on Twitter here.
Event Sessions
One Day Event 9:00 am
Keynote d’ouverture IDC
Cybersécurité sous tension : sommes-nous prêts à gérer la prochaine crise ?
Cadres de lecture IDC sur l’intensification des menaces cyber, l’impact des tensions géopolitiques, la pression réglementaire et le rôle stratégique des RSSI et dirigeants.
Cyrille Chausson
Uriel Marie-Sainte
Avec une solide expérience en cybersécurité, Uriel a consacré sa carrière à aider les organisations à naviguer dans les complexités techniques des solutions de sécurité modernes. Aujourd’hui chez 1Password, il accompagne les clients et les partenaires dans le renforcement de la sécurité des accès et la résolution de défis tels que le fossé de confiance en matière d’accès et le shadow IT. Son expérience inclut des postes chez Zscaler, où il s’est concentré sur l’ingénierie des solutions et l’accompagnement des partenaires, faisant de lui une voix précieuse dans les conversations au carrefour de la sécurité, de la gestion des accès et de l’activation business.
Event Sessions
One Day Event 10:20 am
Workshops IDC Connect par 1Password
Piloter la cybersécurité dans un monde instable : méthodes, cadres et priorités
Sessions interactives IDC autour de NIS2, DORA, gestion du risque tiers, résilience opérationnelle, préparation à la gestion de crise, communication avec les directions générales et exercices de simulation.
Agenda
IT Security Summit
One Day Event
Welcome & Networking Breakfast
Kick off the day with coffee and peer-to-peer connections among CISOs, IT directors, and risk-focused executives.
IDC Opening Keynote
Cybersecurity Under Pressure: Are We Ready for the Next Crisis?
IDC’s insights on escalating cyber threats, geopolitical impacts, regulatory pressures, and the strategic role of CISOs and IT leaders.
Duncan Brown
Group Vice President, IDC Europe, IDC
Panel #1 – Digital Sovereignty vs Economic Reality: An Unsolvable Dilemma?
Cross-perspectives on strategic trade-offs between digital sovereignty and economic constraints.
Thibaut Roynette, CISO, Danone
- Trade-offs between sovereignty and economic performance
- Technological dependencies and strategic choices
- Pathways toward realistic autonomy
Pierre Kochanski, CISO, Ministry of Economy and Finance
- Geopolitical and regulatory constraints
- Tensions between competitiveness and security
- Regulatory framework and national sovereignty
Suvansh Lal, CISO, Equans France
- Economic reality of large corporations
- Impact of dependencies on strategic decision-making
- Concrete steps toward greater autonomy
Thibaut Roynette
CISO/RSSI, DANONE
Pierre Kochanski
Directeur Coordination des Technologies de l’Information, MINISTERE ECONOMIES ET FINANCES
Suvansh Lal
CISO, EQUANS FRANCE
Partner Keynote – Sophos
Security, Resilience, and Continuity: Facing Increasingly Systemic Threats
Bruno Durand
VP Sales Southern Europe, Sophos
IDC Connect Workshop by 1Password
Navigating Cybersecurity in an Unstable World
Interactive sessions on NIS2, DORA, third-party risk management, operational resilience, crisis preparedness, executive communication, and live simulation exercises.
Uriel Marie-Sainte
Enterprise Solutions Engineer – EMEA, 1Password
Networking Break
Managing a Cyber Crisis: When the Board Enters the War Room
A firsthand account of cyber crisis management, from the war room to the boardroom.
Vincent Gapaillard, CISO, Loxam
- The CISO’s role in a crisis situation
- Interactions with the board under pressure
- Decision-making dynamics in the war room
- Key lessons drawn from his experience
Vincent Gapaillard
RSSI, LOXAM
Supply Chain Attacks: Lessons from CISOs Who’ve Been There
An interview on the real-world impact of supply chain attacks and how security leaders navigate the organisational fallout.
José Arujo, CISO, SNCF Voyageurs Group
- How ecosystems amplify third-party risk exposure
- Operational chaos and crisis response in practice
- Hard-won lessons and concrete actions to strengthen your supply chain security
José Araujo
Directeur de la Cybersecurité, Groupe SNCF
Networking Lunch
Guest Interview
CISOs Under Pressure: Making Decisions, Reassuring Teams, Sustaining Performance
Entretien avec un RSSI, un dirigeant ou un expert sur la pression humaine et mentale liée aux crises cyber, la fatigue opérationnelle, la gestion du stress des équipes, et les leviers pour préserver la performance et l’engagement dans la durée.
CISO and Digital Sovereignty: From Technical Constraint to Strategic Autonomy
A firsthand look at the CISO’s growing influence in the digital sovereignty debate — from managing technological dependencies to repositioning the security function as a true strategic partner to executive leadership.
Eugénie Laurian
Experte I Stratégie en sécurité numérique: cybersécurité et protection des données, MINISTERE DES ARMEES
Panel #2: Cybersecurity Operating Models in the Age of AI
Expert and executive perspectives on:
- the decline of centralized security models and the structures taking their place,
- how organizations can keep pace with AI-driven threats that outrun human response,
- the shifting roles of CISOs, teams, and leadership in an AI-first security landscape.
Khaoula Ben Ayed
CTO, EDENRED
Pierre-Marie Quantin
Responsable Cybersecurity, GROUPE TF1
Adrien Ruggirello
Délégué Général, NEOMA
Closing Cocktail and Networking
Thibaut Roynette
Pierre-Marie Quantin
Event Sessions
One Day Event 2:55 pm
Panel #2: Cybersecurity Operating Models in the Age of AI
Expert and executive perspectives on:
- the decline of centralized security models and the structures taking their place,
- how organizations can keep pace with AI-driven threats that outrun human response,
- the shifting roles of CISOs, teams, and leadership in an AI-first security landscape.
José Araujo
Event Sessions
One Day Event 12:15 pm
Supply Chain Attacks: Lessons from CISOs Who’ve Been There
An interview on the real-world impact of supply chain attacks and how security leaders navigate the organisational fallout.
José Arujo, CISO, SNCF Voyageurs Group
- How ecosystems amplify third-party risk exposure
- Operational chaos and crisis response in practice
- Hard-won lessons and concrete actions to strengthen your supply chain security
Jane Rain
Pierre Kochanski
Event Sessions
One Day Event 9:20 am
Panel #1 – Digital Sovereignty vs Economic Reality: An Unsolvable Dilemma?
Cross-perspectives on strategic trade-offs between digital sovereignty and economic constraints.
Thibaut Roynette, CISO, Danone
- Trade-offs between sovereignty and economic performance
- Technological dependencies and strategic choices
- Pathways toward realistic autonomy
Pierre Kochanski, CISO, Ministry of Economy and Finance
- Geopolitical and regulatory constraints
- Tensions between competitiveness and security
- Regulatory framework and national sovereignty
Suvansh Lal, CISO, Equans France
- Economic reality of large corporations
- Impact of dependencies on strategic decision-making
- Concrete steps toward greater autonomy
Khaoula Ben Ayed
Event Sessions
One Day Event 2:55 pm
Panel #2: Cybersecurity Operating Models in the Age of AI
Expert and executive perspectives on:
- the decline of centralized security models and the structures taking their place,
- how organizations can keep pace with AI-driven threats that outrun human response,
- the shifting roles of CISOs, teams, and leadership in an AI-first security landscape.
Olivier Tillier
Eugénie Laurian
Event Sessions
One Day Event 2:20 pm
CISO and Digital Sovereignty: From Technical Constraint to Strategic Autonomy
A firsthand look at the CISO’s growing influence in the digital sovereignty debate — from managing technological dependencies to repositioning the security function as a true strategic partner to executive leadership.
Vincent Gapaillard
Event Sessions
One Day Event 11:40 am
Managing a Cyber Crisis: When the Board Enters the War Room
A firsthand account of cyber crisis management, from the war room to the boardroom.
Vincent Gapaillard, CISO, Loxam
- The CISO’s role in a crisis situation
- Interactions with the board under pressure
- Decision-making dynamics in the war room
- Key lessons drawn from his experience
Suvansh Lal
Event Sessions
One Day Event 9:20 am
Panel #1 – Digital Sovereignty vs Economic Reality: An Unsolvable Dilemma?
Cross-perspectives on strategic trade-offs between digital sovereignty and economic constraints.
Thibaut Roynette, CISO, Danone
- Trade-offs between sovereignty and economic performance
- Technological dependencies and strategic choices
- Pathways toward realistic autonomy
Pierre Kochanski, CISO, Ministry of Economy and Finance
- Geopolitical and regulatory constraints
- Tensions between competitiveness and security
- Regulatory framework and national sovereignty
Suvansh Lal, CISO, Equans France
- Economic reality of large corporations
- Impact of dependencies on strategic decision-making
- Concrete steps toward greater autonomy
Key Topics
1. Digital Sovereignty, Regulation and Value Creation: From Burden to Strategic Asset
NIS2, DORA, national strategy 2026–2030: regulatory pressure keeps mounting, and penalties are hitting hard. Yet the CISOs who know how to seize this moment are turning compliance into a competitive edge. How do you make compliance a credibility lever in the boardroom? How do you strike the right balance between technological sovereignty and real economic constraints? This track repositions the CISO where they belong: as a strategic architect.
2. Offensive AI vs Defensive AI: The CISO Caught in the Crossfire
Deepfakes, autonomous phishing, agents capable of orchestrating intrusions without human intervention — attack speed is outpacing teams’ ability to respond. Meanwhile, Shadow AI is quietly creating invisible vulnerabilities from within. How do you deploy defensive AI at scale without opening new attack surfaces? This track confronts CISOs with their real trade-offs, right now.
3. Organisational Models and Security Operations: Who Decides, Who Acts?
The centralised CISO model is running out of steam — overexposed, isolated, facing threats that keep accelerating. The most mature organisations are already redesigning their structures: AI-augmented SOCs, separation of strategic and operational oversight, redefined roles all the way up to the executive committee. This track tackles the questions no one wants to answer yet: how do you build an organisation that holds over time, without burning out your teams or losing effectiveness?
4. Supply Chain Attacks and Third-Party Risk: From Mapping to Real-Time Resilience
A compromised vendor, a poorly governed third-party access, an invisible dependency — and the entire chain goes down. More than one in three major incidents originates from a third party. Yet most organisations still manage this risk through annual questionnaires. This track explores the shift to dynamic, continuous management: mapping critical failure points, applying Zero Trust to supplier ecosystems, and concrete strategies to contain the spread before it’s too late.
5. Managing a Cyber Crisis: From the War Room to the Board — and Beyond
You will be attacked. The real question: are you ready to recover, fast, under the board’s scrutiny? Executive leadership no longer wants dashboards. They want to know what holds under degraded conditions, how quickly, and with what evidence. This track covers the essentials: playbooks, crisis simulation, communication under pressure, managing your team through the storm — and the concrete levers to rebuild trust after the incident.
6. Security in Critical Environments: When Failure Is Not an Option
Energy, healthcare, industry, local authorities: here, a cyberattack doesn’t disrupt an IT system — it paralyses vital infrastructure. OT/IoT environments remain under-protected, hybrid architectures multiply blind spots, and attackers know it. This track is for CISOs and CIOs for whom continuity is not a goal but an obligation — and who must build genuine resilience in environments where there is no margin for error.
IDC 2028 Forecast
By 2028, AI agents will handle up to 80% of security alerts across the majority of SOCs worldwide. As automation accelerates, human accountability, oversight, and the ability to make decisive judgments will become critical differentiators for organizations.
Venue
Carré Edouard VII – Paris
13 bis Rue Bruno Coquatrix, 75009 Paris
This year, we invite you to join us at Carré Édouard VII, in the heart of Paris’s Opéra district.
A central and elegant venue, easily accessible by public transportation, and the perfect place to meet and connect.
Further Reading
NIS 2 Directive: Where Do We Stand Today?
The NIS 2 transposition deadline passed in October 2024, yet only a few EU member states had completed the process, creating a climate of uncertainty for many European organizations.
Implications for IT Spending in Europe Amid NATO’s 5% GDP Target
At the 2025 NATO Summit in The Hague, held just a few weeks ago, member states committed to allocating 5% of their annual GDP to defense and security spending, including digital and cyber capabilities by 2035.
IAM 2025: The Age of Machines
Identity and Access Management (IAM), and identity security more broadly, has become one of the most critical and cross-functional challenges for European organizations today, impacting both operational efficiency and risk management.
Not quite aligned with your current priorities?
No problem. IDC hosts events year-round to inspire fresh ideas, deliver the latest market insights, and connect professionals like you. Sign up to receive invitations and be the first to know when an event matches your interests.
Register now