Rights Management and Secure File Sharing –
Secure Collaboration in the Cloud
||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
||Earn 3.75 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.
||Hilton Zurich Airport Hotel
There are a lot of free park places available.
Train: railway station Zurich Airport – take the Hotel Shuttle
|Date of Event
||31st of August 2016
||English, if non-German speaking people will attend, otherwise German
||see agenda below
||Fr. 55.— per participants
Organization, presentations, beverages and aperitif included
|2:30 – 3:00
||Registration & Coffee
|3:00 – 3:15
||Welcome & Introduction by Erich Vogt, on behalf of SIGS
CIA + A: a holistic view on Information Security
Any Information, anytime, at any Place on any Device! That’s the stuff which our users (or even we) are expecting today. But the Information has to be (Confidential), Integer, Authentic and most of all Available!
I’m presenting a personal view on that Dance on the Slackline. Last but not least: maybe we should add another A. – A/ffordable.
|3:15 – 3:45
||Itzhak Hacmon, Head Information Security at Bank Hapoalim (Switzerland) Ltd.
Keeping your unstructured data under control
Every organization has sensitive or business critical data. You must identify where yours is to ensure it is protected from the risk of insider threats, ransomware or other malicious activity! You already know this, but you probably still have some questions, such as…
- How can I find where my sensitive and high-risk data resides?
- Who owns this data, who has access to it and who is using it?
- And if I could identify your high-risk data, how could I ensure it is securely locked down, and access permissions are on a least-privilege basis?
- How can you make sure your data classification is up-to-date all the time?
In this presentation you will learn more from my experience to keep unstructured data under control and what the biggest challenges are.
|3:45 – 4:15
||René Eberhard, CEO at keyon AG
Classify or Die
Sensitive data is used and stored on-prem, on mobile devices, and in the cloud. Data loss prevention solutions have to be adapted accordingly to the new challenges. With digital rights management (DRM) data can automatically be classified and protected on generation or edit. E-discovery capabilities from DRM allow to track who got access to such data by when and where. Unlike other technologies, the classification and encryption are intrinsically linked with the respective data and thus provides a continuous and transparent protection to the user, regardless of data transmission or location.
The presentation shows the need to classify and protect data as requirement for Data Loss Prevention, Secure Collaboration and the step into the Cloud.
|4:15 – 4:45
|4:45 – 5:15
||Martin Sieber, Senior Consultant at Microsoft Switzerland
Evolution from RMS to Information Protection
This session will give you an update of the evolution in the field of Information Protection. It covers the rationale behind information protection, from local solutions to cloud offerings. You will get a preview on a possible way for data classification / automatic protection that will also allow coexistence of local and cloud-based solutions. Lastly we provide a short outlook on other upcoming RMS features.
The session should answer the following questions:
- Why should you protect your documents and mails and what might be a solution for you?
- How can you solve the challenge in sharing information with your external partners?
- Should the key be stored in software or in hardware?
- What does Microsoft offer for data classification?
- Can users protect highly sensitive data with AD RMS and still use Azure RMS for external collaboration?
|5:15 – 5:45
||Anthony Francis, Senior Consultant at Accellion
How to make the Cloud secure – Single Pane of Glass to Enterprise and Cloud Content without VPN
Integrated with Office 365, SharePoint, Azure, and Outlook, we will show you a secure way to access, edit, and share files stored in multiple content systems like Documentum, OpenText, Home Drives, Windows File Shares, Google Drive, Microsoft OneDrive, Box, Dropbox, and other content sources. Learn how you can enable enterprise employees to collaborate with external customers and partners, with added protection on top of existing on-premises or cloud content. We will show you a way how you can enabling mobile workers to be as productive as possible – whenever and wherever they are working.
If topics like user friendly Digital Rights Management (DRM) integration and ICAP-based DLP solution integration in a secure file sharing and collaboration platform are points of interest for your company as well, you should definitively attend this session.
|5:45 – 6:15
||Marek Pietrzyk, Director and Project Manager of the UBS Client Data Confiden¬tiality Program, DRM
Implementing efficient Document Protection Solutions
Over the period of last four years UBS has designed, implemented and successfully deployed a global Data Classification & Protection solution called DRM (Digital Rights Management).
This challenging and work intense program has provided a number of observations and recommendations for implementing efficient document protection solutions, which will be summarized and shared with the audience. The focus of this session is on the classification and encryption/decryption challenges – and how those can be overcome, resulting in the increased document protection levels and good user acceptance.
- Which documents are to be protected (classified and encrypted) within and outside of the organization?
- Which classification use cases work best (automatic vs. manual, document vs. user centric)?
- What are the document protection measures and how efficient those really are (encryption, rights enforcement of file operations, MFA, RBAC, off-line/premise access)?
- Challenges for integration of protected, especially encrypted, documents into the operational infrastructure and business processes.
- Is a broader accepted “persistent classification only” the more efficient solution for protection, than encryption (user awareness and acceptance, or user disturbance)?
- Beyond the “universal classification schema”: advantages of “ad-hoc classification” based on the ABAC Access Management: the next generation DRM.
|6:15 – 6:30
||Panel Discussion moderated
|6:30 – open end
||Apéro Riche & Networking
The speakers will be onsite for Q&A
The Sponsors of this event are:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.