Information-Centric Cybersecurity

  •  TYPE: Track    START DATE: Thursday, May 11, 2017     START TIME: 11:00    LOCATION:  BODENSEE II
Parent Track


Along with a strong trend towards cyber attacks with a commercial background, data theft is more and more turning into data manipulation. This can cause severe and long-term damage to organizations and requires a data-centric approach to information protection.


Data Protection Thrives on a Comprehensive Approach to Security

Date: Thursday, May 11, 2017 Time: 11:00-12:00

Data Protection Thrives on a Comprehensive Approach to Security
Dan Blum, KuppingerCole

Encryption Politics: Where does it Stand?
Laima Janciute, University of Westminster

This intervention offers an analysis of the current politics around encryption and related implications. Encryption is a key element of the existing and emerging communications networks and infrastructures and crucial for enactment of privacy-by-design principles. While many might know that the current crypto-tensions are re-iterating the so-called crypto-wars of the 1990s, the issue goes much further back in the history: there were bans on the use of the “coded language” already...

The ID-Pro Body of Knowledge: Taxonomy Draft
Colin Wallis, Kantara Initiative • Thorsten Niebuhr, WedaCon

During the last European Identity and Cloud Conference in Munich on 11 May 2016, Kantara unveiled an industry-wide drive to create a non-profit, open professional association to represent and certify digital identity professionals. Since then, more than 380 individuals have signed the 'pledge' to support the initiative. During the past few months, a Kantara Discussion Group has actively developing various aspects of the association in several project streams. One of these project streams...

Overcoming Challenges Related to the Implementation of Data-Centric File Protection Solutions.

Date: Thursday, May 11, 2017 Time: 12:00-13:00

Overcoming Challenges Related to the Implementation of Data-Centric File Protection Solutions.
Marek Pietrzyk, UBS Switzerland

Implementing efficient Document Protection Solutions Over the last four years UBS has designed, implemented and successfully deployed a global Data Classification & Protection solution called DRM (Digital Rights Management). This challenging and work intense program has provided a number of observations and recommendations for implementing efficient document protection solutions, which will be summarized and shared with the audience. The focus of this session is on the classification...

How an Innovation Leader Protects its Intellectual Property with DRM
Peter Dornheim, Festo AG & Co. KG

As a global, independent family-owned company in Germany, FESTO has become the performance leader in its industry over the last 50 years, thanks to its innovations in all areas of factory and process automation technology. To develop and deliver this innovations, the protection of the intellectual property is one of the major goals within the company. To do so, Digital Rights Management (DRM) was implemented many years ago and is constantly improved and adapted to current and future needs....

Munich, Germany


European Identity & Cloud Conference 2017

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 09 - 12, 2017 Munich, Germany