This event is history, please check out the List of Upcoming Seminars, or send us an email
Check out our related in-house workshops:
Why do we organize this seminar ?
Today, information is a very important asset of many companies and these companies need to keep their information confidential internally as well as externally. The last few months have given us many examples how confidential information got lost and was exposed to the outside world.
Data confidentiality is not only a concern for companies and organisation towards the outside world, but also in the company itself. With the introduction of digital rights management (DRM) systems, companies can decide who can do what with which specific document or content.
It is not only important to protect confidential data, but also to protect the hardware device where this data is stored on. People are becoming more mobile using laptops, mobile phones, PDA's and so on which means that the information becomes more mobile. As a company, you should make sure that the devices used by your employees are protected so that the data stored on it can never be recovered by an unauthorized person.
Questions answered during this seminar:
This seminar explains how to correctly implement data protection solutions and related technologies nowadays:
All these questions will be treated during the seminar and highlighted with recent use cases.
Who should attend this seminar ?
Any person needing to have a practical update from a business or security perspective on data protection and related technologies.
Functionally speaking these persons can be:
During the last few months, several cases of information losses and thefts became public and published in the press. These losses have a large impact on the company or organisation involved, and damages the public image and credibility of these companies and organisations. You can ask yourself what would happen to your company if internal information was spread to the public ...
In order to determine what the consequences can be, you need to know the risks involved when confidential information leaks and gets public. Do you have the right procedures, policies and audits in place? What can you do as a company to prevent such an incident? What are the legal consequences if such an event should take place ?
This module will discuss real world situations and the implications it can have for a company where its confidentiality was compromised.
Today, many applications dealing with sensitive information are used within a company. These applications go from simple email communication to the company's ERP and CRM systems, databases, file servers and web applications. These applications should guarantee information confidentiality at all times and avoid getting internal information in the open.
This module will cover the different aspects of data protection at the application level, what the issues are and what you can do to prevent information leakage from these critical corporate applications.
Not only applications are a weak link in data protection, but also the devices used to store this confidential information. As people are becoming more mobile, the information becomes more mobile and devices like laptops, PDA's, USB keys and handhelds are more commonly used.
How can you protect these devices in order to make sure that if they got lost, the data stored on these devices cannot be accessed by anyone else?
Companies can have multiple sites which need to be connected and exchange information in a secure way. Besides that, not everyone can access the same information which means that a verification mechanism needs to be in place which makes it possible to identify a person before he gets access to the requested information.
How can (SSL)VPN's help you to protect your information and guarantee data confidentiality and how can you be sure that only authorized personnel gets access to the right information?
This module will give you an answer to these questions:
Digital Rights Management becomes more important when it comes to data protection. DRM allows you to clearly define the access and usage rights of digital data and enables you to granularly define which actions can be performed by who on which specific data.
Digital Rights Management offers a supplemental security layer to the company's information security which enables you to enforce more restrictive access policies and usage rights for your company's internal information.
This module explains what Digital Rights Management exactly is, how it works and how you can use it in your company.
For a company to be able to implement data protection solutions, it must implement data protection as a complete solution:
This module will give you an overview of the analysis and design requirements necessary for implementing a data protection solution for your company.
ir. Erik R. van Zuuren MBA is Senior Manager at Deloitte Enterprise Risk Services and has an extensive experience in Information Security Governance and Risk Management related disciplines, both at strategic and tactical level and has an extensive experience at C-level in the private sector and management- / cabinet-level in the public sector.
ir. Erik R. van Zuuren MBA is active as consultant since over 10 years and since participated in and led a broad range of strategic and tactical projects mostly in Belgium and The Netherlands. Some examples of his experience are:
Steven Ackx is a Certified Senior level consultant at Ascure NV with extensive experience in ICT and Information Security related disciplines both at the strategic, tactical, operational and technical levels where he has focused on Information Security Governance, Information Security Management, Assessments/Audits, Awareness Programs and Risk Management. He started his career in the Media/Movie-theatre sector, where he was involved in the introduction of new technologies, like Internet, e-ticketing and e-business. After this he joined Ubizen where he continued his career starting as a security pre-sales consultant/engineer. Two years later he was promoted to technical product manager of two high-volume security products, which were developed in-house by Ubizen. After being a technical product manager at Ubizen for more than two years, he joined the Ascure company as an Information Security Consultant mainly working on Information Governance and Security Management. He is also responsible for all Ascure education, marketing and communication activities.
Mr. Ackx has a consultancy and management background in information security, networking and security applications disciples and has engaged in several major and medium security and related projects throughout his career.
He obtained the CISSP certification (Certified Information Security Systems Professional issued by ISC²) and the CISA certification (Certified Information Systems Auditor issued by ISACA) as well as the CISM certification (Certified Information Systems Manager issued by ISACA). He graduated with an EMBIS masters degree (European Master in Business Information Systems) at the EHSAL (Brussels - Belgium).
Cristof Fleurus has worked in the PKI and Trusted Services profession for a number of years and has large experience in designing and implementing PKI architectures. He is currently employed by Ascure as Information Security Consultant. In his current function as Consultant, Cristof is responsible for analyzing, designing and implementing PKI architectures and applications for clients. Besides PKI and Trusted Services, Cristof also consults on application and web application security. He has experience in a number of business and industry sectors including: Banking, Government, Social Security, Energy Services, and the Information and Telecommunication (ICT) sector.
Questions about this ? Interested but you can't attend ? Send us an email !