Data Governance Event

In the event from February 6, 2018 in Geneva, the four companies Securosys, ELCA, SailPoint and United Security Providers presented their answers to data breaches, cyber criminality and regulations like the upcoming European General Data Protection Regulation (GDPR) or the Swiss Federal Protection Act (DPA). Below you find abstract of the speeches and the presentations as pdf.

 




 

Keep your data safe and be compliant via a 360° approach
Nagib Aouini, Head of Cyber Security Services Division - ELCA

Cyber security incidents and data breaches regularly grab headlines. It now becomes obvious that all companies may suffer from such events. And, with the changing regulatory landscape that makes data protection and privacy fundamental constitutional rights, compliance violations is another risk to be considered. During this keynote, we propose to have an holistic 360° approach to protect and secure your data at rest and in transit, while complying with regulations.

Keep your data safe and be compliant via a 360° approach - presentation as pdf

 

Where identity meets data - Data access governance solutions for the enterprise
Mark Oldroyd, Partner Enablement Manager, Europe – SailPoint

When it comes to defining your cyber security posture, insider threat is one of the major considerations. The changing face of enterprise IT is blurring the boundary between internal and external users and causing us to reconsider our security paradigms. In addition, new legislations such as GDPR are forcing organisations to understand more about the information being processed by the Business and how this can be better protected. One of the areas most impacted by these changes is what we call ‘unstructured data’.

Where identity meets data - Data access governance solutions for the enterprise

 

Hackers are looking at your encryption keys - How to protect them with hardware
Robert Rogenmoser, CEO & Founder - Securosys

The most secure solution for storing encryption keys are Hardware Security Modules (HSM). They are a trust anchor. HSM generate trusted certificates and key and store them securely. The advantages are their high performance and their ability to protect any content from unauthorized access.

Hackers are looking at your encryption keys - How to protect them with hardware – Presentation as pdf

Associated topics:
 

USP Connect® - How security excellence becomes visible with a Swiss Cyber Security Solution
Dr. Michael Schläpfer - United Security Providers

Our Digitized Service Management Interface will change your perception of security. Imagine visible security excellence where you can just manage demand and concentrate on finding and executing the right steps for growths and differentiation of your business. We show you a comprehensive Swiss Cyber Security Solution, monitored and operated 24/7 in all time zones and compliant to Swiss Federal Data Protecting Act (DPA), Swiss Financial Market Supervisory Authority (FINMA) and the upcoming General Data Protection Regulation (GDPR).

How security excellence becomes visible with a Swiss Cyber Security Solution – presentation as pdf