{"id":573,"date":"2020-01-28T17:29:57","date_gmt":"2020-01-28T16:29:57","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/exhibit"},"modified":"2026-03-23T17:03:56","modified_gmt":"2026-03-23T16:03:56","slug":"exhibit","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibit\/","title":{"rendered":"Exhibit"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-573\" data-title=\"Exhibit\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-es\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-573-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>BECOME EXHIBITOR<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-573-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row][vc_column]\t<div class=\"wyvc-anchors\">\r\n\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#who-exhibits\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">WHO EXHIBITS<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#td\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">HOSTED BUYERS<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#request\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">BECOME EXHIBITOR<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#kit-media\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">MEDIA Kit<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n[\/vc_column][\/vc_row][vc_section][vc_row el_id=&#8221;who-exhibits&#8221;][vc_column]<div id=\"wyvc-section-title-5698\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Who exhibits<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-5698.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"wyvc-section-title-8888\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>The sectors present<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks and Telecoms&#8221; tab_id=&#8221;1577354495611-a83fa4c2-4cf9&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Unified communication<\/li>\n<li>Creation of open source solutions<\/li>\n<li>VoIP \/ ToIP<\/li>\n<li>Network Operator<\/li>\n<li>Telecom Operator \/ Mobile<\/li>\n<li>Network administration<\/li>\n<li>Performance management<\/li>\n<li>Terminals (ip, digital, sip)<\/li>\n<li>Communication solution \/ Videoconferencing<\/li>\n<li>NFC Services<\/li>\n<li>M2M Solutions<\/li>\n<li>Contact Centre<\/li>\n<li>Hardware<\/li>\n<li>Distributor in Telecoms \/ equipment<\/li>\n<li>Infrastructure management<\/li>\n<li>Fixed and mobile convergence<\/li>\n<li>SDN (Software-Defined Networking)<\/li>\n<li>Infrastructure management software<\/li>\n<li>Collaborative meetings \/ interactive meetings \/ Room reservation management<\/li>\n<li>Wan optimization<\/li>\n<li>Hyper-convergence<\/li>\n<li>Router \/ Switch<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Mobility&#8221; tab_id=&#8221;1577354495666-6d2614ed-6a35&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Mobility Solutions \/ Mobility Products<\/li>\n<li>Peripherals<\/li>\n<li>Mobile \/ Ruggedized Terminals<\/li>\n<li>Mobile Applications<\/li>\n<li>Mobile CRM<\/li>\n<li>M payment<\/li>\n<li>Fleet management<\/li>\n<li>Embedded system \/ Geolocation<\/li>\n<li>Traceability<\/li>\n<li>Development of custom business applications<\/li>\n<li>BYOD Management<\/li>\n<li>Mobile Device Management (MDM)<\/li>\n<li>Connected objects<\/li>\n<li>EMM (Enterprise Mobility Management)<\/li>\n<li>Telecom Expense Management<\/li>\n<li>Mobile Application Testing<\/li>\n<li>Intervention Management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cybersecurity&#8221; tab_id=&#8221;1577354495715-f9cd4c04-62d1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Security software<\/li>\n<li>Safety equipment<\/li>\n<li>Monitoring tools \/ supervision<\/li>\n<li>Secure infrastructure services<\/li>\n<li>Authentication Service<\/li>\n<li>Data security<\/li>\n<li>Anomaly management<\/li>\n<li>Security test<\/li>\n<li>Cloud Security<\/li>\n<li>DNS<\/li>\n<li>Identity\/email\/data\/contract protection<\/li>\n<li>Backup and data storage<\/li>\n<li>Secure networks<\/li>\n<li>Mobile networks<\/li>\n<li>Geolocation<\/li>\n<li>Connected objects<\/li>\n<li>RGPD Services\/Solutions<\/li>\n<li>Messaging Security<\/li>\n<li>DDOS<\/li>\n<li>Devsecops<\/li>\n<li>Endpoint<\/li>\n<li>Firewall<\/li>\n<li>Workload Protection<\/li>\n<li>Email<\/li>\n<li>CSPM<\/li>\n<li>Mobile<\/li>\n<li>Wi-fi<\/li>\n<li>Encryption<\/li>\n<li>ZTNA<\/li>\n<li>Switch<\/li>\n<li>RED<\/li>\n<li>Access Point<\/li>\n<li>Managed Threat Response<\/li>\n<li>Rapid Response<\/li>\n<li>Professional Services<\/li>\n<li>RiskManagement \/ Cyber Risk Management<\/li>\n<li>Cyber Insurance \/ Scoring<\/li>\n<li>Compliance<\/li>\n<li>Governance<\/li>\n<li>Identity and Access Management (IAM)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cloud computing&#8221; tab_id=&#8221;1577354495770-32b5f639-08fd&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Automation<\/li>\n<li>Cloud Computing System<\/li>\n<li>Software publishing \/ SAAS solutions<\/li>\n<li>Edge Computing<\/li>\n<li>Platform or infrastructure solutions in cloud mode (PAAS, IAAS)<\/li>\n<li>Hosting<\/li>\n<li>Virtualization<\/li>\n<li>Virtualization of the workstation<\/li>\n<li>DAAS Solutions<\/li>\n<li>BI Solutions<\/li>\n<li>Big Data<\/li>\n<li>Analytics<\/li>\n<li>Dematerialization<\/li>\n<li>Collaborative<\/li>\n<li>Private Cloud<\/li>\n<li>Public Cloud<\/li>\n<li>Hybrid Cloud<\/li>\n<li>ITIL<\/li>\n<li>ITSM<\/li>\n<li>Cloud Provider<\/li>\n<li>Unified endpoint management<\/li>\n<li>Custom AI<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Data center&#8221; tab_id=&#8221;1577354266026-3d24d7dc-6ed4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Optimization \/ Redesign, construction and extension of datacenters<\/li>\n<li>Outsourcing \/ Outsourcing<\/li>\n<li>Storage<\/li>\n<li>Infrastructure hosting<\/li>\n<li>Managed Services<\/li>\n<li>Backup<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Advice and training&#8221; tab_id=&#8221;1577354314274-eacd3422-49e5&#8243;][vc_column_text]<\/p>\n<ul>\n<li>SSII \/ Integrator<\/li>\n<li>Consulting in new technologies<\/li>\n<li>Training<\/li>\n<li>Project management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Managed Services&#8221; tab_id=&#8221;1577354354524-64c8c886-aaec&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Monitoring tools<\/li>\n<li>Network Supervision<\/li>\n<li>Measurement and reporting<\/li>\n<li>Managed Print Service (MPS)<\/li>\n<li>Performance<\/li>\n<li>Security and Business Continuity (BCP)<\/li>\n<li>Outsourcing<\/li>\n<li>Digital product design<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Print \/ document&#8221; tab_id=&#8221;1577354389487-dfa7a5d1-36a6&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Printing systems<\/li>\n<li>Hardware solutions<\/li>\n<li>Software Solutions<\/li>\n<li>Document management<\/li>\n<li>Document Security<\/li>\n<li>Print dematerialization<\/li>\n<li>Records Management Services (MDS)<\/li>\n<li>Remote printing and scanning<\/li>\n<li>Document Sharing<\/li>\n<li>Document audit<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column]<div id=\"wyvc-section-title-9856\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>A concept designed for you<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<strong>IT &amp; CYBERSECURITY MEETINGS<\/strong>\u00a0is an event conducive to meetings and exchanges, with the aim of being a real business accelerator for your activity.<\/p>\n<p>With <strong>pre-programmed meetings<\/strong> and business lunches, conferences &amp; workshops, this meetings has been designed to save you time, allow you to meet your future partners and optimise your network\u2026 all in a professional and friendly atmosphere.<\/p>\n<p><strong>IT &amp; CYBERSECURITY MEETINGS,<\/strong>\u00a0remains an accelerator of contacts to meet future partners, maintain or perfect your network and exchange on your problems.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Business meetings pre-organized before the event, targeted and ultra-qualified between Hosted Buyers and Exhibitors.<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Business lunches pre-organized before the event between Hosted Buyers and Exhibitors<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">High-level plenary conferences<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">1 opening dinner to launch the event and build the first contacts, exclusively between exhibitors and Hosted Buyers<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">1 free evening to have to opportunity to invite your clients\/prospects and extend the exchanges<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">1 closing dinner, exclusively between exhibitors and Hosted Buyers<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">A team dedicated to the follow-up of appointments during and after the event<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Spanish Hosted Buyers present for 2 days<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/salons.weyou-cms.com\/itsm\/en\/exhibit#request\" title=\"Exhibit\">\r\n\t\t<span class=\"wyvc-btn-text\">EXHIBIT<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column]<div id=\"wyvc-section-title-7172\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Key numbers<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"wyvc-counter wyvc-shortcode \" style=\"text-align: center\">\r\n\t<div class=\"wyvc-c-inner\">\r\n\t\t\t\t\t<div class=\"number-wrapper\">\r\n\t\t\t\t\t\t\t\t<span class=\"wyvc-c-digit\" >150<\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<p class=\"wyvc-c-title\" >\r\n\t\t\t\tHOSTED BUYERS\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"wyvc-counter wyvc-shortcode \" style=\"text-align: center\">\r\n\t<div class=\"wyvc-c-inner\">\r\n\t\t\t\t\t<div class=\"number-wrapper\">\r\n\t\t\t\t\t\t\t\t<span class=\"wyvc-c-digit\" >80<\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<p class=\"wyvc-c-title\" >\r\n\t\t\t\tEXHIBITORS STANDS\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column_inner][\/vc_row_inner][vc_separator style=&#8221;shadow&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;1206&#8243; parallax_speed_bg=&#8221;2&#8243; css=&#8221;.vc_custom_1584961936226{padding-top: 50px !important;}&#8221;][vc_row][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row el_id=&#8221;td&#8221; css=&#8221;.vc_custom_1622034823501{margin-top: -60px !important;background-color: #ffffff !important;border-radius: 1px !important;}&#8221;][vc_column]<div id=\"wyvc-section-title-6937\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Hosted buyers profiles<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-6937.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Information Systems Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">IT Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Networks and Telecoms Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Infrastructure Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">IT Production Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Information Systems Security Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Technical IT Manager \/ Logistic Manager<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Buyer and prescriber of solutions \/ products at the reseller<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"wyvc-testimonials wyvc-shortcode \">\r\n\t<div class=\"wyvc-t-inner wyvc-owl-carousel clearfix\" data-enable-loop=\"yes\" data-enable-autoplay=\"yes\" data-enable-autoplay-hover-pause=\"no\" data-enable-navigation=\"yes\" data-enable-pagination=\"yes\">\r\n\t\t<div class=\"wyvc-t-item\">\r\n\t<div class=\"wyvc-t-content\">\r\n\t\t\t\t\t<p class=\"wyvc-t-text\"><span>Un salon business avec des RDV one-to-one qui permet de faire de vraies rencontres avec les prospects et d&#039;\u00e9changer avec profondeur sur les projets. Le cadre est excellent et l&#039;\u00e9v\u00e8nement propice \u00e0 rencontrer de nouveaux clients.\u00a0<\/span><\/p>\r\n\t\t\t\t\t\t\t<span class=\"wyvc-t-author\">\r\n\t\t\t\t<span class=\"wyvc-t-author-label\">Marie DEROGNAT\u2013 Chef de projet Marketing \u2013 WAYCOM<\/span>\r\n\t\t\t\t\t\t\t<\/span>\r\n\t\t\t<\/div>\r\n<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\" href=\"https:\/\/salons.weyou-cms.com\/itsm\/en\/testimonials-gallery\" title=\"Galerie T\u00e9moignages\">\r\n\t\t<span class=\"wyvc-btn-text\">OUR PARTICIPANTS TESTIFY<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1584962727512{padding-top: 50px !important;}&#8221; el_id=&#8221;request&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-5822\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Become an exhibitor<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-5822.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]To find out how to participate and the different offers, please contact our sales department by filling in the information request.<\/p>\n<p>Our teams will get back to you as soon as possible.[\/vc_column_text][vc_text_separator title=&#8221;Contact&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center\">+33 1 89 70 35 47<\/p>\n<p>[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/exhibitor.weyou-group.com\/it-and-cybersecurity-meetings-es\/demande-information\/si\" target=\"_blank\" rel=\"nofollow\">\r\n\t\t<span class=\"wyvc-btn-text\">Request for information<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5936&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;kit-media&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-2257\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Media Kit<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-2257.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;7017&#8243; css=&#8221;&#8221;][vc_single_image image=&#8221;7021&#8243; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-media-text-wrapper img-txt-btn\">\r\n\t<div class=\"wyvc-media-text wyvc-shortcode\">\r\n\t\t<div class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2\">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t<p class=\"wyvc-st-title\">\r\n\t\t\tGain more visibility \r\n\t\t<\/p>\r\n\t<\/div>\r\n<\/div>\r\n\t<div class=\"wyvc-text\"><p>If you want to get all the banners of IT &amp; CYBERSECURITY MEETINGS, download the Media Kit.<\/p>\n<\/div> \r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/media-kit\/\" target=\"_blank\" title=\"Kit media\">\r\n\t\t<span class=\"wyvc-btn-text\">Access to the MEDIA Kit<\/span>\r\n\t<\/a>\r\n<\/div>\r\n\t<\/div>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row el_id=&#8221;who-exhibits&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks and Telecoms&#8221; tab_id=&#8221;1577354495611-a83fa4c2-4cf9&#8243;][vc_column_text] Unified communication Creation of open source solutions VoIP \/ ToIP Network Operator Telecom Operator \/ Mobile Network administration Performance management Terminals (ip, digital, sip) Communication solution \/ Videoconferencing NFC Services M2M Solutions Contact Centre Hardware Distributor in Telecoms \/ equipment Infrastructure management Fixed [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-573","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exhibit - IT and Cybersecurity One to one Meetings Espa\u00f1a<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exhibit - IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row el_id=&#8221;who-exhibits&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks and Telecoms&#8221; tab_id=&#8221;1577354495611-a83fa4c2-4cf9&#8243;][vc_column_text] Unified communication Creation of open source solutions VoIP \/ ToIP Network Operator Telecom Operator \/ Mobile Network administration Performance management Terminals (ip, digital, sip) Communication solution \/ Videoconferencing NFC Services M2M Solutions Contact Centre Hardware Distributor in Telecoms \/ equipment Infrastructure management Fixed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T16:03:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/\",\"url\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/\",\"name\":\"Exhibit - IT and Cybersecurity One to one Meetings Espa\u00f1a\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\"},\"datePublished\":\"2020-01-28T16:29:57+00:00\",\"dateModified\":\"2026-03-23T16:03:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exhibit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"name\":\"IT & Cybersecurity Meetings\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\",\"name\":\"IT & Cybersecurity Meetings\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"width\":198,\"height\":175,\"caption\":\"IT & Cybersecurity Meetings\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/\",\"https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exhibit - IT and Cybersecurity One to one Meetings Espa\u00f1a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/","og_locale":"en_US","og_type":"article","og_title":"Exhibit - IT and Cybersecurity One to one Meetings Espa\u00f1a","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row el_id=&#8221;who-exhibits&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks and Telecoms&#8221; tab_id=&#8221;1577354495611-a83fa4c2-4cf9&#8243;][vc_column_text] Unified communication Creation of open source solutions VoIP \/ ToIP Network Operator Telecom Operator \/ Mobile Network administration Performance management Terminals (ip, digital, sip) Communication solution \/ Videoconferencing NFC Services M2M Solutions Contact Centre Hardware Distributor in Telecoms \/ equipment Infrastructure management Fixed [&hellip;]","og_url":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/","og_site_name":"IT and Cybersecurity One to one Meetings Espa\u00f1a","article_modified_time":"2026-03-23T16:03:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/","url":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/","name":"Exhibit - IT and Cybersecurity One to one Meetings Espa\u00f1a","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website"},"datePublished":"2020-01-28T16:29:57+00:00","dateModified":"2026-03-23T16:03:56+00:00","breadcrumb":{"@id":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/exhibit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Exhibit"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","name":"IT & Cybersecurity Meetings","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization","name":"IT & Cybersecurity Meetings","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","width":198,"height":175,"caption":"IT & Cybersecurity Meetings"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/","https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw"]}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/comments?post=573"}],"version-history":[{"count":8,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/573\/revisions"}],"predecessor-version":[{"id":7117,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/573\/revisions\/7117"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/media?parent=573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}