This event is history, please check out the List of Upcoming Seminars
Check out our related in-house workshops:
During the last few months, several cases of information losses and thefts became public and published in the press. These losses have a large impact on the company or organisation involved, and damages the public image and credibility of these companies and organisations. You can ask yourself what would happen to your company if internal information was spread to the public ...
In order to determine what the consequences can be, you need to know the risks involved when confidential information leaks and gets public. Do you have the right procedures, policies and audits in place? What can you do as a company to prevent such an incident? What are the legal consequences if such an event should take place ?
This module will discuss real world situations and the implications it can have for a company where its confidentiality was compromised.
Today, many applications dealing with sensitive information are used within a company. These applications go from simple email communication to the company's ERP and CRM systems, databases, file servers and web applications. These applications should guarantee information confidentiality at all times and avoid getting internal information in the open.
This module will cover the different aspects of data protection at the application level, what the issues are and what you can do to prevent information leakage from these critical corporate applications.
Not only applications are a weak link in data protection, but also the devices used to store this confidential information. As people are becoming more mobile, the information becomes more mobile and devices like laptops, PDA's, USB keys and handhelds are more commonly used.
How can you protect these devices in order to make sure that if they got lost, the data stored on these devices cannot be accessed by anyone else?
Companies can have multiple sites which need to be connected and exchange information in a secure way. Besides that, not everyone can access the same information which means that a verification mechanism needs to be in place which makes it possible to identify a person before he gets access to the requested information.
How can (SSL)VPN's help you to protect your information and guarantee data confidentiality and how can you be sure that only authorized personnel gets access to the right information?
This module will give you an answer to these questions:
Digital Rights Management becomes more important when it comes to data protection. DRM allows you to clearly define the access and usage rights of digital data and enables you to granularly define which actions can be performed by who on which specific data.
Digital Rights Management offers a supplemental security layer to the company's information security which enables you to enforce more restrictive access policies and usage rights for your company's internal information.
This module explains what Digital Rights Management exactly is, how it works and how you can use it in your company.
For a company to be able to implement data protection solutions, it must implement data protection as a complete solution:
This module will give you an overview of the analysis and design requirements necessary for implementing a data protection solution for your company.SPEAKERS »