Algeria 2.0 Summit is considered as the annual international crossroad of ICT, new technologies and WEB 2.0 professionals. Being a unique exchange and networking platform, our summit’s main purpose is to ensure an alteration of our society towards a digital future and provide the latest trends in the technological field. Algeria 2.0 Summit sets forth many companies including producers, students, scientific clubs, developers and suppliers of hardware, content, technology delivery systems and so much more …
WHERE
LIVE | ONLINE
WHEN
Tuesday, May 31st,
To Thursday, Juin 2nd, 2022
We are a peer-to-peer exchange for all IT companies and infrastructures and we will ensure that attendees are going to obtain real-world knowledge and training in order to grow in a digital world achieving a more developed and sustainable future.
It is an open online event which will draw together many IT professionals, entrepreneurs and founders, investors and business leaders, software developers, specialists in the fields and many exhibitors of the brand new technologies.
Language: French
Talk
Language: English
Talk
Language: English
Workshop
Language: Arabic
Talk
Language: Arabic
Workshop
Language: English
Talk
Language: French
Talk
Language: english
Talk
Language: French
Talk
Language: english
Panel
Language: English
Talk
1. Introduction
2. Cybersecurity’s terminology
3. The motives of Cyberattacks
a. Types of Hackers
4. Types of Threats
a. Hacking
b. Phishing
c. Spamming
5. Ethical Hacking
a. Methodology
Language: English
Talk
Comment le design peut-il aider à conduire des projets de conception numérique, en engageant les collaborateurs de l’organisation et en prenant en compte les futurs utilisateurs ?
Language: French
Workshop
Language: English
Talk
Language: English
Talk
Language: English
Workshop
With malware like “emotet” claiming more than 2$ billion dollars in damages and the recent supply chain attack that hit “solar winds” infecting more than 30 companies, 13 of which are government agencies. It becomes clearer than ever that security is a key component of any technologies based infrastructure.
Understanding how these threat actors and malware authors operate is key to prevent the next attack from being successful.
In this session, I’ll talk about some of the tools and techniques that are currently being used by malware authors and threat actors to perform their attacks and how can we as security teams detect and hopefully prevent them from happening.
Language: English
Talk
Language: english
Workshop
Language: English
Talk
Language: English
Workshop
Language: English
Talk
Language: English
Talk
Language: English
Workshop
Language: English
Workshop
Language: French
Talk
Language: French
Talk
Language: English
Talk
Successful adoption requires change in people, processes and technology.
During this conference, Abdelkarim will share with you his experience as well as the Framework that structures how to:
• Develop a culture around a business application to maximize ROI
• Evolve your business strategies through agile delivery of business applications.
• Structure your approach to self-service application adoption.
• Make sure your companies are mastering the tool and develop a centre of excellence.
Language: English
Talk
Language: English
Talk
Language: French
Talk
Language: French
Talk
Language: English
Talk
Language: English
Panel
Language: English
Panel
Language: French
Talk
Language: English
Talk