IT Security Summit

IT Security Summit

Securing Business in an Age of Uncertainty

10 Jun 2026 Paris, France
Slide
Slide
Slide
Slide

Cyber disruption, digital sovereignty, and leadership when it matters most

The IDC Security Summit France is the flagship annual event for CISOs, CIOs, security leaders, and executive decision-makers confronting a rapidly escalating cyber threat landscape.

As geopolitical friction intensifies, technology supply chains grow more complex, and regulatory demands expand, cybersecurity has moved beyond the IT function. It now sits firmly at the core of enterprise strategy – shaping sovereignty, resilience, and executive accountability.

In 2026, the Summit will unveil a fully immersive, scenario-based experience built around a high-impact cyber crisis simulation. Designed to reflect real-world dynamics, the format will challenge leaders to make critical decisions under pressure – balancing operational continuity, reputation, compliance, and stakeholder trust in real time.

More than a technology conference, the Summit explores what it truly takes to lead through crisis: clarity in uncertainty, coordination across functions, and the endurance to respond to sustained and increasingly credible attacks.

Strategic Context

According to IDC, cybersecurity is being fundamentally reshaped by the convergence of geopolitics and artificial intelligence.

By 2027:

  • One-third of governments will mandate sovereign AI strategies in sensitive sectors.

  • 80% of organizations will be exposed to phishing campaigns powered by AI-generated synthetic identities.

At the same time, AI-augmented threats are accelerating in scale and sophistication. Deepfakes, voice cloning, manipulated digital evidence, attacks targeting AI models, and the uncontrolled spread of “shadow AI” are dramatically increasing operational complexity and cognitive overload for security teams.

In this context, the IDC Security Summit France provides senior leaders with forward-looking insights, strategic benchmarks, and practical frameworks to reinforce digital sovereignty, strengthen enterprise resilience, and enhance executive decision-making in high-pressure environments.

Our speakers

Thibaut Roynette

Thibaut Roynette

CISO/RSSI

DANONE

Read bio

Pierre Kochanski

Pierre Kochanski

Directeur Coordination des Technologies de l’Information

MINISTERE ECONOMIES ET FINANCES

Read bio

Vincent Gapaillard

Vincent Gapaillard

RSSI

LOXAM

Read bio

Eugénie Laurian

Eugénie Laurian

Experte I Stratégie en sécurité numérique: cybersécurité et protection des données

MINISTERE DES ARMEES

Read bio

Suvansh Lal

Suvansh Lal

CISO

EQUANS FRANCE

Read bio

Bruno Durand

Bruno Durand

VP Sales Southern Europe

Sophos

Read bio

Duncan Brown

Duncan Brown

Group Vice President, IDC Europe

IDC

Read bio

Cyrille Chausson

Cyrille Chausson

Research Manager

IDC Europe

Read bio

Uriel Marie-Sainte

Uriel Marie-Sainte

Enterprise Solutions Engineer – EMEA

1Password

Read bio

Agenda

IT Security Summit

One Day Event

8:30 am

Welcome & Networking Breakfast

Kick off the day with coffee and peer-to-peer connections among CISOs, IT directors, and risk-focused executives.

9:00 am

IDC Opening Keynote

Cybersecurity Under Pressure: Are We Ready for the Next Crisis?

IDC’s insights on escalating cyber threats, geopolitical impacts, regulatory pressures, and the strategic role of CISOs and IT leaders.

Duncan Brown

Duncan Brown

Group Vice President, IDC Europe, IDC

9:20 am

Panel #1 – Digital Sovereignty vs Economic Reality: An Unsolvable Dilemma?

Cross-perspectives on strategic trade-offs between digital sovereignty and economic constraints.

Thibaut Roynette, CISO, Danone

  • Trade-offs between sovereignty and economic performance
  • Technological dependencies and strategic choices
  • Pathways toward realistic autonomy

Pierre Kochanski, CISO, Ministry of Economy and Finance

  • Geopolitical and regulatory constraints
  • Tensions between competitiveness and security
  • Regulatory framework and national sovereignty

Suvansh Lal, CISO, Equans France

  • Economic reality of large corporations
  • Impact of dependencies on strategic decision-making
  • Concrete steps toward greater autonomy
Thibaut Roynette

Thibaut Roynette

CISO/RSSI, DANONE

Pierre Kochanski

Pierre Kochanski

Directeur Coordination des Technologies de l’Information, MINISTERE ECONOMIES ET FINANCES

Suvansh Lal

Suvansh Lal

CISO, EQUANS FRANCE

10:05 am

Partner Keynote – Sophos

Security, Resilience, and Continuity: Facing Increasingly Systemic Threats

Bruno Durand

Bruno Durand

VP Sales Southern Europe, Sophos

10:20 am

IDC Connect Workshop by 1Password

Navigating Cybersecurity in an Unstable World

Interactive sessions on NIS2, DORA, third-party risk management, operational resilience, crisis preparedness, executive communication, and live simulation exercises.

Uriel Marie-Sainte

Uriel Marie-Sainte

Enterprise Solutions Engineer – EMEA, 1Password

11:20 am

Networking Break

11:40 am

Managing a Cyber Crisis: When the Board Enters the War Room

A firsthand account of cyber crisis management, from the war room to the boardroom.

Vincent Gapaillard, CISO, Loxam

  • The CISO’s role in a crisis situation
  • Interactions with the board under pressure
  • Decision-making dynamics in the war room
  • Key lessons drawn from his experience
Vincent Gapaillard

Vincent Gapaillard

RSSI, LOXAM

12:15 pm

Supply Chain Attacks: Lessons from CISOs Who’ve Been There

An interview on the real-world impact of supply chain attacks and how security leaders navigate the organisational fallout.

José Arujo, CISO, SNCF Voyageurs Group

  • How ecosystems amplify third-party risk exposure
  • Operational chaos and crisis response in practice
  • Hard-won lessons and concrete actions to strengthen your supply chain security
José Araujo

José Araujo

Directeur de la Cybersecurité, Groupe SNCF

12:40 pm

Networking Lunch

2:00 pm

Guest Interview

CISOs Under Pressure: Making Decisions, Reassuring Teams, Sustaining Performance

Entretien avec un RSSI, un dirigeant ou un expert sur la pression humaine et mentale liée aux crises cyber, la fatigue opérationnelle, la gestion du stress des équipes, et les leviers pour préserver la performance et l’engagement dans la durée.

2:20 pm

CISO and Digital Sovereignty: From Technical Constraint to Strategic Autonomy

A firsthand look at the CISO’s growing influence in the digital sovereignty debate — from managing technological dependencies to repositioning the security function as a true strategic partner to executive leadership.

Eugénie Laurian

Eugénie Laurian

Experte I Stratégie en sécurité numérique: cybersécurité et protection des données, MINISTERE DES ARMEES

2:55 pm

Panel #2: Cybersecurity Operating Models in the Age of AI

Expert and executive perspectives on:

  • the decline of centralized security models and the structures taking their place,
  • how organizations can keep pace with AI-driven threats that outrun human response,
  • the shifting roles of CISOs, teams, and leadership in an AI-first security landscape.
Khaoula Ben Ayed

Khaoula Ben Ayed

CTO, EDENRED

Pierre-Marie Quantin

Pierre-Marie Quantin

Responsable Cybersecurity, GROUPE TF1

Adrien Ruggirello

Adrien Ruggirello

Délégué Général, NEOMA

3:05 pm

Closing Cocktail and Networking

Advisory Board

The IT Security Summit Advisory Board brings together a hand-picked circle of top IT and security leaders to shape the strategic vision and agenda of the event.

It’s your exclusive forum to exchange insights with peers, influence the Summit program, and tackle the most pressing cybersecurity challenges—all in a confidential and highly collaborative environment.

We’re thrilled to introduce the 2026 Advisory Board members!

Thibaut Roynette

Thibaut Roynette

CISO/RSSI

DANONE

Read Bio

Pierre-Marie Quantin

Pierre-Marie Quantin

Responsable Cybersecurity

GROUPE TF1

Read Bio

José Araujo

José Araujo

Directeur de la Cybersecurité

Groupe SNCF

Read Bio

Jane Rain

Jane Rain

Directrice Cyberprotection et RSSI Groupe

LA POSTE GROUPE

Read Bio

Pierre Kochanski

Pierre Kochanski

Directeur Coordination des Technologies de l’Information

MINISTERE ECONOMIES ET FINANCES

Read Bio

Khaoula Ben Ayed

Khaoula Ben Ayed

CTO

EDENRED

Read Bio

Olivier Tillier

Olivier Tillier

CISO

BOUYGUES CONSTRUCTION

Read Bio

Eugénie Laurian

Eugénie Laurian

Experte I Stratégie en sécurité numérique: cybersécurité et protection des données

MINISTERE DES ARMEES

Read Bio

Vincent Gapaillard

Vincent Gapaillard

RSSI

LOXAM

Read Bio

Suvansh Lal

Suvansh Lal

CISO

EQUANS FRANCE

Read Bio

Key Topics

1. Digital Sovereignty, Regulation and Value Creation: From Burden to Strategic Asset

NIS2, DORA, national strategy 2026–2030: regulatory pressure keeps mounting, and penalties are hitting hard. Yet the CISOs who know how to seize this moment are turning compliance into a competitive edge. How do you make compliance a credibility lever in the boardroom? How do you strike the right balance between technological sovereignty and real economic constraints? This track repositions the CISO where they belong: as a strategic architect.

2. Offensive AI vs Defensive AI: The CISO Caught in the Crossfire

Deepfakes, autonomous phishing, agents capable of orchestrating intrusions without human intervention — attack speed is outpacing teams’ ability to respond. Meanwhile, Shadow AI is quietly creating invisible vulnerabilities from within. How do you deploy defensive AI at scale without opening new attack surfaces? This track confronts CISOs with their real trade-offs, right now.

3. Organisational Models and Security Operations: Who Decides, Who Acts?

The centralised CISO model is running out of steam — overexposed, isolated, facing threats that keep accelerating. The most mature organisations are already redesigning their structures: AI-augmented SOCs, separation of strategic and operational oversight, redefined roles all the way up to the executive committee. This track tackles the questions no one wants to answer yet: how do you build an organisation that holds over time, without burning out your teams or losing effectiveness?

4. Supply Chain Attacks and Third-Party Risk: From Mapping to Real-Time Resilience

A compromised vendor, a poorly governed third-party access, an invisible dependency — and the entire chain goes down. More than one in three major incidents originates from a third party. Yet most organisations still manage this risk through annual questionnaires. This track explores the shift to dynamic, continuous management: mapping critical failure points, applying Zero Trust to supplier ecosystems, and concrete strategies to contain the spread before it’s too late.

5. Managing a Cyber Crisis: From the War Room to the Board — and Beyond

You will be attacked. The real question: are you ready to recover, fast, under the board’s scrutiny? Executive leadership no longer wants dashboards. They want to know what holds under degraded conditions, how quickly, and with what evidence. This track covers the essentials: playbooks, crisis simulation, communication under pressure, managing your team through the storm — and the concrete levers to rebuild trust after the incident.

6. Security in Critical Environments: When Failure Is Not an Option

Energy, healthcare, industry, local authorities: here, a cyberattack doesn’t disrupt an IT system — it paralyses vital infrastructure. OT/IoT environments remain under-protected, hybrid architectures multiply blind spots, and attackers know it. This track is for CISOs and CIOs for whom continuity is not a goal but an obligation — and who must build genuine resilience in environments where there is no margin for error.

Partners

Venue

Carré Edouard VII – Paris

13 bis Rue Bruno Coquatrix, 75009 Paris

This year, we invite you to join us at Carré Édouard VII, in the heart of Paris’s Opéra district.
A central and elegant venue, easily accessible by public transportation, and the perfect place to meet and connect.

Further Reading

NIS 2 Directive: Where Do We Stand Today?

The NIS 2 transposition deadline passed in October 2024, yet only a few EU member states had completed the process, creating a climate of uncertainty for many European organizations.

Learn more

Implications for IT Spending in Europe Amid NATO’s 5% GDP Target

At the 2025 NATO Summit in The Hague, held just a few weeks ago, member states committed to allocating 5% of their annual GDP to defense and security spending, including digital and cyber capabilities by 2035.

Learn more

IAM 2025: The Age of Machines

Identity and Access Management (IAM), and identity security more broadly, has become one of the most critical and cross-functional challenges for European organizations today, impacting both operational efficiency and risk management.

Lire l'article