SIGS Afterwork Event Basel
Classification and label-centric security approach in Office 365
|Target Audience||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
|CPE Credits||Earn 2 CPE (Continuing Professional Education) for attending a SIGS Afterwork Event. Please request a confirmation.|
|Location||Radisson Blu Hotel, Steinentorstrasse 25, Basel|
|Date of Event||29th of August 2017|
|Language||English if non German speaking people will attend, otherwise German|
|Participation Costs||Fr. 30.–
This includes presentations, all beverages and aperitif (food)
|5:00 – 5:30||Registration & Apéro|
|5:30 – 6:00||René Eberhard, CEO at keyon AG
Classification and label-centric security approach in O365 – understanding the big picture
Organizations no longer operate solely within their premises. Cloud and mobility become more and more important. Data is transmitted between organizations, users, devices, and applications, regardless of their location. The challenge is to identify sensitive information and to apply the right level of control in order to maintain security and privacy of such information. Today’s security approach is to control data on premises and/or on a device. The classification and label-centric security approach applies security directly to the data itself, so that it’s always protected and identifiable, regardless of the location, device, application, or any additional security measures.
The goal of the presentation is to highlight the big picture of the classification- and label-centric security approach from an organizational view and how it can be implemented in an organization, especially in O365 and other applications.
|6:00 – 6:30||Daniel von Büren, Technology Solution Specialist at Microsoft
Identities – the new security perimeter
A lot of organizations still mainly invest in network security to protect their business data. However, the security landscape has changed and companies have to handle new challenges today. We strongly belief in a “Assume Breach” approach, where IT assumes that a hacker was already able to breach the security boundaries and accessing data. To manage these kind of scenarios IT needs new security tools which are able to identifies attackers in the network based on advanced detection methods.
The goal of this presentation is to give you a better understanding about the todays challenges and what kind of solutions are available for IT. We would like to give you a clear picture how you could implement such solutions in your organization.
|6:30 – 7:00||Urs Schmid, IT Security Officer at Manor AG
Office 365 und Security: back to field no. 1?
Office 365 is a public cloud service, so it comes with a number of potential concerns — availability and security being the two biggest ones. Further questions are; do we have to reinvent everything from scratch or can we reuse several proven techniques from on premise as well in the future? What needs to be changed in the processes and maybe as well in user trainings, and what can we keep?
There are a number of benefits to a SaaS offering like Office 365, but you are playing by Microsoft’s rules, which means there are some things you can’t do. Let’s have an open discussion and bring together the experiences from all participants.
|7:00 – open end||Apéro Riche & Networking
The speakers will be onsite for Q&A
The sponsor of this event is:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.