Data and Information Protection

Data and Information Protection


Secure your data and keep it in your company

24 October 2006 (14-21)
Location: Crowne Plaza Brussels Airport (Diegem)
Presented in English
Price: 540 EUR (excl. 21% VAT)
AGENDA » SPEAKERS »


This event is history, please check out the List of Upcoming Seminars

Check out our related in-house workshops:


Full Programme:
13.30h - 14.00h
Registration, coffee/tea and croissants
14.00h - 14.50h
Watch your Back

During the last few months, several cases of information losses and thefts became public and published in the press. These losses have a large impact on the company or organisation involved, and damages the public image and credibility of these companies and organisations. You can ask yourself what would happen to your company if internal information was spread to the public ...

In order to determine what the consequences can be, you need to know the risks involved when confidential information leaks and gets public. Do you have the right procedures, policies and audits in place? What can you do as a company to prevent such an incident? What are the legal consequences if such an event should take place ?

This module will discuss real world situations and the implications it can have for a company where its confidentiality was compromised.

  • What would happen to your company if internal information was spread to the public ?
  • What are the risks and the (legal) consequences ?
  • The right procedures, policies and audits
  • How can you prevent such an incident
  • Real-world situations and their implications
14.50h - 15.40h
Information and Application Protection

Today, many applications dealing with sensitive information are used within a company. These applications go from simple email communication to the company's ERP and CRM systems, databases, file servers and web applications. These applications should guarantee information confidentiality at all times and avoid getting internal information in the open.

This module will cover the different aspects of data protection at the application level, what the issues are and what you can do to prevent information leakage from these critical corporate applications.

  • Data protection at the application level
  • Examples: email servers, ERP and CRM systems, databases, file servers, web applications, ...
  • How to prevent information leakage from your critical corporate applications
15.40h - 16.00h
Coffee/Tea and Refreshments
16.00h - 16.50h
Device Protection

Not only applications are a weak link in data protection, but also the devices used to store this confidential information. As people are becoming more mobile, the information becomes more mobile and devices like laptops, PDA's, USB keys and handhelds are more commonly used.

How can you protect these devices in order to make sure that if they got lost, the data stored on these devices cannot be accessed by anyone else?

  • Protecting storage devices
  • Protecting mobile devices like laptops, PDA's, USB keys and handhelds
  • Preventing data access when these devices get lost or are stolen
16.50h - 17.40h
Secure Data Access and Secure Communication

Companies can have multiple sites which need to be connected and exchange information in a secure way. Besides that, not everyone can access the same information which means that a verification mechanism needs to be in place which makes it possible to identify a person before he gets access to the requested information.

How can (SSL)VPN's help you to protect your information and guarantee data confidentiality and how can you be sure that only authorized personnel gets access to the right information?

This module will give you an answer to these questions:

  • How can you exchange information in a secure way between multiple sites ?
  • How can you make sure that only authorized personnel gets access to the right information ?
  • How can (SSL)VPN's help you to protect your information and guarantee data confidentiality ?
17.40h - 19.00h
Dinner
19.00h - 19.50h
Digital Rights Management (DRM)

Digital Rights Management becomes more important when it comes to data protection. DRM allows you to clearly define the access and usage rights of digital data and enables you to granularly define which actions can be performed by who on which specific data.

Digital Rights Management offers a supplemental security layer to the company's information security which enables you to enforce more restrictive access policies and usage rights for your company's internal information.

This module explains what Digital Rights Management exactly is, how it works and how you can use it in your company.

  • Why DRM is becoming more and more important
  • What is DRM and how does it work ?
  • Clearly defining the access and usage rights of digital data
  • Specifying which actions can be performed by who on which specific data
  • How can you use DRM in your company ?
19.50h - 20.40h
Secure Design: Required Infrastructure and Processes

For a company to be able to implement data protection solutions, it must implement data protection as a complete solution:

  • What are the required processes ?
  • What are the required policies ?
  • What is the required (supporting) infrastructure for implementation ?
  • How will you identify and authenticate users ?
  • How will you recover lost/inaccessible information ?

This module will give you an overview of the analysis and design requirements necessary for implementing a data protection solution for your company.

20.40h - 21.00h
Final Q & A
21.00h
End of this seminar
        SPEAKERS »

Questions about this ? Interested but you can't attend ? Send us an email !