European Identity & Cloud Conference 2015
05.05. – 08.05.2015, Munich, Germany


For many years, digital rights management was an issue for content providers, who were primarily concerned about copyright infringement of intellectual property through unauthorised copying, viewing or printing of media made available on the internet. As a means of access control, it had its critics, mostly from those who felt that it was an unnecessary inconvenience that did little to protect copyright. This track will explore how much attitudes have evolved, from both a user perspective and what is actually happening in the marketplace.

After attending this block of sessions you will be able to

  • Describe Information Centric Security and the technologies which safeguard information
  • Describe how to protect, track and control sensitive data

This block qualifies for up to 2 Group Learning based CPEs depending on the number of sessions you attended.

The Future of Collaboration

07.05.2015 11:00-12:00

Digital Rights Management – UBS Case Study

As a global operating financial institution UBS provides investment banking, asset management, and wealth management services for private, corporate, and institutional clients worldwide. UBS is the biggest bank in Switzerland, operating in more than 50 countries with about 60,000 employees around the world.

As a leading financial services provider, UBS defines information security as the backbone of our business. Our clients, as well as employees trust us to keep their information safe and secure, so it is critical that we prevent any accidental or unauthorized access to them.  

The session will present UBS’ experience in defining and executing an enterprise-wide data classification and protection project to ensure the safety and integrity of the firm’s sensitive client data. The presentation will focus on UBS´ experience on:

  • Classification and protection of reports generated from applications containing CID (Client Identifying Data).
  • Methods for automatic protection of downloaded or user generated files.
  • Measures for effective controls of internal and external transmissions of emails with sensitive content.
  • Keeping all activities logged, reported and monitored enterprise-wide.
  • And how to successfully deploy such a major security infrastructure release – avoiding number of security traps.

Coutts Bank Case Study

Secure Information Sharing – The User Experience

As a result of the number of high profile, headline-grabbing revelations about security breaches and the consequent, well-publicised legal and financial implications, many enterprises, already worried about the free-and-easy transmission of sensitive company material have been impelled to take action to ensure that in the future their digital assets are far better protected from falling into the wrong hands than previously.

This session will show the experience and lessons learned from some of the early adopters of rights management

Market Maturity

07.05.2015 12:00-13:00

Protecting and Tracking Sensitive Data

Modern organizations routinely share sensitive data both internally and externally. This session will present a solution capable of letting data owners protect, control, and track their sensitive data regardless of where it is used (or abused). We’ll specifically present solutions for both front office and industrial use cases.

Information Centric Security; the Way to Go?

In the current world of fast-moving organizations with high demands of new services and supporting IT-systems we can no longer deal with the “old” perimeterized way of protecting the organizations assets. We are in need of a much more focussed and efficient approach that will allow us to protect our assets on their needs. Classification of information and protecting at it it’s source is the way forward. Solutions have evolved that can make this happen without the major downsides of previous technologies that had business users adjust their behaviour and think about the needed protection at the end-user level. Nowadays technologies can be implemented that are transparent and easy-to-use while protecting the organizations assets against abuse and misplacement. The presentation will describe the changing landscape, the methodology to such an approach and a description of technologies that can assist in moving forward protecting your information.

Key Takeaways:

  • Alternative view on protecting your organizations assets
  • Methodological approach to such a process
  • Key technologies that can assist
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.