Information Stewardship in Practice: Secure Information Sharing

  •  TYPE: Track    START DATE: Wednesday, May 14, 2014     START TIME: 14:30    LOCATION:  ALPSEE
Conference Agenda


Information stewardship is about taking care of information that you hold. Organizations need to address the underlying information security challenges of malice, misuse and mistake while allowing information to be used and shared appropriately and securely. This block of session will cover the business imperatives for information rights management including the legal case and the emerging technologies that are becoming available to support it.

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block of sessions you will be able to:

  • Describe Business Drivers for Information Rights Management.
  • Describe various alternatives approaches to Information Rights Management.
  • Explain the technical concepts behind Information Rights Management using Microsoft Azure RMS as an example.
  • Describe the legal requirements for protecting documents – the legal case for IRM.
  • Describe best practices for securely sharing information.

This block qualifies for up to 3 Group Learning based CPEs depending on the number of sessions you attend.


Information Rights Management: Finally Ready for Prime Time

Date: Wednesday, May 14, 2014 Time: 14:30-15:30

Information Rights Management: Finally Ready for Prime Time
Martin Kuppinger, KuppingerCole

It’s a perfect coincidence. On one hand, demand for Secure Information Sharing is not only growing but exploding in the „post Snowden era“. On the other hand, we see a number of new and improved solutions appearing in the market. Thus, Information Rights Management is finally becoming ready for widespread adoption. Information Rights Management protects documents by encrypting them and attaching access control. These access controls are enforced by the applications that are...

Understanding Information Rights Management Architectures
Tim Upton, TITUS Inc. • Yuval Eldar, Secure Islands • Philippe Beraud, Microsoft

This session will have a look at the technical concepts behind IRM, based on the example of Microsoft’s Azure RMS. It looks at how encryption is done, the various options for managing keys, the integration with applications, and the management of users. Given that IRM, despite all progress, still is a complex topic, this sessions provides background information about how IRM works, which helps designing own implementations.

The Business Drivers for Information Rights Management

Date: Wednesday, May 14, 2014 Time: 15:30-16:30

The Business Drivers for Information Rights Management
Don Schmidt, Microsoft • Philippe Beraud, Microsoft • Yoran Sirkis, Covertix • Borja Rosales, Druva

In this panel, experts from various organizations discuss about the business drivers they see for implementing Information Rights Management solutions. They especially will focus on the arguments that help them sell this to the business decision makers, but also on how to balance potential changes in user behavior due to Information Rights Management and the demand of users for convenience. Additionally, the question will be discussed whether full IRM is the right way to protect your...

The Legal Requirements for Protecting Documents – the IRM Legal Case
Dr. Karsten Kinast, KuppingerCole

In this presentation, Karsten Kinast will talk about the legal case behind Information Rights Management. When must you use such technologies? When should you use them? Or is it sufficient to send documents around unprotected?

eHealthcare Done Right: Strong Identities, Privacy, Secure Information Access and Sharing

Date: Wednesday, May 14, 2014 Time: 17:30-18:30

eHealthcare Done Right: Strong Identities, Privacy, Secure Information Access and Sharing
Martin Kuppinger, KuppingerCole • Don Schmidt, Microsoft • Kim Cameron, • Peter Weierich, iC Consult GmbH

There are few areas than eHealthcare, which are less regulated and less sensitive when it comes to Information Security. Patient records are highly sensitive. On the other hand, eHealthcare is a highly connected business, with hospitals, doctors and nurses, insurance companies, and the patients themselves as important players – not to forget the pharmaceutical and life sciences industry, universities, and others. Strong authentication and strong identities are key. Flexibility for...


European Identity & Cloud Conference 2014

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 13 - 16, 2014 Munich, Germany