SIGS Afterwork Event Bern

Classification and label-centric security approach in Office 365…
… and more best practice about Cloud

Save the DateKlick for the .ics file to save the date

Target Audience Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security

From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.

CPE Credits Earn 2 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.
Location PostFinance Arena
Mingerstrasse 12
3014 Bern (Wankdorf)

Date of Event 12th of October 2017

Language German

Participation Costs Fr. 30.–
This includes presentations, all beverages and aperitif (food)


4:00 – 5:00 Registration & Kaffee
5:00 – 5:30 René Eberhard, CEO at keyon AG

Classification and label-centric security approach in O365 – understanding the big picture
Organizations no longer operate solely within their premises. Cloud and mobility become more and more important. Data is transmitted between organizations, users, devices, and applications, regardless of their location. The challenge is to identify sensitive information and to apply the right level of control in order to maintain security and privacy of such information. Today’s security approach is to control data on premises and/or on a device. The classification and label-centric security approach applies security directly to the data itself, so that it’s always protected and identifiable, regardless of the location, device, application, or any additional security measures.

The goal of the presentation is to highlight the big picture of the classification- and label-centric security approach from an organizational view and how it can be implemented in an organization, especially in O365 and other applications.

5:30 – 6:00 Daniel von Büren, Technology Solution Specialist at Microsoft

Identities – the new security perimeter
A lot of organizations still mainly invest in network security to protect their business data. However, the security landscape has changed and companies have to handle new challenges today. We strongly belief in a “Assume Breach” approach, where IT assumes that a hacker was already able to breach the security boundaries and accessing data. To manage these kind of scenarios IT needs new security tools which are able to identifies attackers in the network based on advanced detection methods.

The goal of this presentation is to give you a better understanding about the todays challenges and what kind of solutions are available for IT. We would like to give you a clear picture how you could implement such solutions in your organization.

6:00 – 6:30 Erich Vogt, Technical Project Leader (Contract) at CKW AG

Classification – a holistic Approach
In an environment with a lot of different stakeholders and regulations, with a combination of state of the art and quite old (even outdated) technology, it is very important to open the focus, the use of different viewpoints on classification. Some of the viewpoints are: data (PI, availability, legal hold …), application, infrastructure (IoT), users.

The bandwidth of the stakeholders for CKW AG is quite special from private households, SMB, Enterprise and Government (up to critical infrastructure of Switzerland) local and abroad. From that point, the requirements to data protection are quite different and challenging.

In an actual project we had to deal with most of this points: an important application will be replaced with a new one — actual on premise, new on Microsoft Azure. You can profit in this talk about some lessons learned.

6:30 – open end Apéro & Networking

The sponsors of this event are:

So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email

With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.

Mobile Menu