Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016

swisscisosummit
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
Personal Invitation to 6th
summit
Platinum Sponsor Gold Sponsor Gold Sponsor
you are kindly invited to the Swiss CISO Summit No. 6 – a series of moderated roundtable discussions for
sharing information security practices and strategies among senior professionals.
Due there being only a limited number of places, please confirm your attendance as soon as possible.
Prof. Dr. Bernhard M. Hämmerli
Personal Invitation
Time: 12:00h
Place: EMA House, Nordstrasse 1, 8006 Zürich, (few minutes walk only from Zurich HB, parking available)
KeynoteS:
David Rosenthal, Homburger AG: Privacy 2.0: What to expect from the new data protection laws in Europe?
Marek Pietrzyk, UBS AG: Integration of Information Digital Rights Management (DRM) in IT Infrastructure
and Business Processes: challenges and experience sharing
Focus on strategic discussions:
•	Privacy and security policy adaption for privacy 2.0 (new privacy acts)
•	Next generation Information Rights Management: evaluation, implementation and deployment
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
Key benefits are:
•	Experience industry best practices in the Swiss market
•	Actively participate in moderated high level peer exchange
•	Understand drivers for security, gain competence and experience in discussing strategic issues
•	Design, develop and manage effective information security strategies for your own organization
•	Receive an exclusive consolidated end of summit report detailing all the major themes discussed for re-use in 	
	 your organization
swisscisosummit
Platinum Sponsor Gold Sponsor Gold Sponsor
Dear CISO Participant,
Keynote I
Privacy 2.0: What to expect from the new data protection laws in Europe? 20 years after their creation, the
data protection laws in Europe are being revised completely. This is true also for Switzerland. While in some
areas life will become easier, in particular for multinationals, overall, the costs of data protection compliance
will increase. In addition, fines will increase in case of non-compliance. This presentation will provide an update
on what is going on, an overview of key changes in law to expect in the upcoming years, and the resulting
challenges companies will have to deal with, with a particular focus on Switzerland.
David Rosenthal, counsel at Homburger AG, is one of the opinion leaders in the area
of data protection in Switzerland. He has authored a commentary on the Swiss Data
Protection Act. He also regularly advises companies on data protection compliance is-
sues and disputes as well as the Swiss government, e.g. in connection with its projects
to revise Swiss law. He co-heads the IT law practice at Homburger, one of the largest
Zurich business law firms, acts as the secretary of the Swiss Association of Corporate
Data Protection (VUD) and the Swiss Association of E-Discovery and Investigations
(SeDIV) and he lectures at ETHZ and at the University of Basel. Before getting in tothe
legal profession, he worked as a journalist and software developer.
Keynote II
Integration of Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges
and experience sharing. The initial step in DRM is policy development in order to protect bank‘s sensitive
customer data from unauthorized internal access and uncompliant disclosure, as well as to fulfil bank‘s regula-
tory obligations, protect its reputation and avoid financial fines. Evaluation of efficient data protection solutions
is the base for a successful implementation. Application of leading edge technology for mastering both, usabili-
ty and overall complexity was of paramount importance when implementing and deploying DRM. A review of the
impact on daily business processes and end-user experience of the data protection solution is assessing DRM’s
business performance. Recommendations in form of a six-step program for establishing a balanced ecosystem
for managing sensitive data conclude the presentation.
Marek Pietrzyk, director and program manager of the UBS client data confi-
dentiality programme DRM is responsible for cost effective implementation of
the bank’s sophisticated cyber defence requirements on client data protection. In
various positions such as business analyst, strategy consultant, IT architect and
project manager, he gained more than twenty years of experience as information
security practitioner in the financial industry. He is an author of several publica-
tions on software architecture and requirements management and is distingu-
ished speaker at major information security, identity management and e-crime
conferences with focus on data protection.
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
swisscisosummit
3
Round table session I	
Privacy and security policy adaption for privacy 2.0
Progress and revision of data protection law in the European Union but also in Switzerland will force enter-
prises to react. What changes? Where will compliance become easier, and which areas will be particularly
demanding when adapting to the new law? Which measures will help companies to protect against fines?
How will company policies have to be changed in terms of privacy and security?
Exchange between the groups: From each group the major findings will be presented to the audience,
such that each participant gets the whole emphasis of the break out discussion.
Round table session II
Next generation Information Rights Management: evaluation, implementation and deployment
Security and privacy policies result in next generation security and privacy requirements. What are the corner-
stone requirements in this process?
Cost saving implementation builds often a compromise between coverage, usability, user’s acceptance and
complexity: What are technical choices and options? How can we create thoughtful user buy-in? What are the
challenges for end-user and business processes performance?
Introduction to 7th
Swiss CISO Summit on
Integration of partner and clients into corporate security architecture:
The real way to improve the overall security
With keynote from Alain Beuchat, Global Information Security Officer GISO, UBS AG
Safe-the.date: May 31, 2016, 12-19h for joining Swiss CISO Summit in Swissotel, Zürich Oerlikon
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
swisscisosummit
4
Join Swiss CISO Summit
Participation is by invitation only. We accept proposals for new participants. The number of participants is limited
to max. 40 per summit because the effectiveness of trust circles and sharing are limited with larger groups.
Single summit	 CHF 450.– per participant
Three summits	 CHF 1’000.– per participant (25% discount for booking three consecutive summits)
Cancellation Policy
Cancellations of registration are free of charge but no later than seven days before the summit. Cancellations
received beyond this point will incur 100% of the admission fee. In any case, however, a delegate may be sent at
no additional cost.
More information is found at www.ciso-summit.ch
Content responsibility for the summits lies with Prof. Dr. Bernhard M. Hämmerli
Participation
Join this peer-to-peer summit for
sharing strategies to mitigate latest
information security threats.
Register by just replying the invitation e-mail with all your details – or by filling out this interactive PDF-form
	 Three consecutive Summits for CHF 1000.– (3 events, summit 6, 7 & 8, this is equal to one year)
	 6th
Swiss CISO Summit, March 8, 2016 for CHF 450.– (single event)	
Name	Surname
Organization
Street / No.	 ZIP / City
Phone	E-Mail
Registration
swisscisosummit
5
What is the Swiss CISO Summit?
The Swiss CISO Summit facilitates the exchange of current security challenges and opportunities between secu-
rity executives, managers, and thought leaders in Switzerland. Each summit addresses a current hot topic. The
strategic dialog and the subsequent discussions are inspired by a keynote speech from well-recognized national
and international speakers. The moderated and guided discussions in groups of 8-10 members share views,
experiences and strategies. An excerpt of discussion will be written down in the result paper for the participants.
Participation is by invitation only.
How do we maintain confidentiality?
The Swiss CISO Summit is provided as a “closed door” event. This exclusive CISO Executive Membership pro-
gram is created for information security and risk executives giving an environment for achieving new ways of
thinking and ensuring success in protecting their organizations.
The summits are held strictly under «The Chatham House Rules».
Why to join the Swiss CISO Summit?
The Swiss CISO Summit has a unique concept of creating trusted circles amongst executives, managers and
thought leaders. Meeting peers in an advanced business location, having time to network amongst each other
and touch current issues are unique opportunities for sharing experiences, and for receiving advice far beyond
the discussion at the table. The summits are held strictly under «The Chatham House Rules» which is a ruleset
to treat the shared information with full discretion.
•	Extensive networking opportunities with peers and experts on an on-going basis
•	Meet with other leading executives to share successes, failures, obstacles and challenges
•	Learn about the current strategies on managing security threats today and to prepare for the future
•	Make new connections and equip yourself with insider information on recent projects and achievements
What makes the difference?
The Swiss CISO Summit has many and diverse benefits for the invited experts. The participants are the focal
point of the summit and the meeting is not intended for providers to present solutions or products. Sales
is strictly prohibited to the good of open and free CISO information exchange.
Fact Sheet I
Walk away with the knowledge
and insights to make informed decisions
on today’s CISO challenges!
swisscisosummit
6
The history behind the Swiss CISO Summit
The Swiss CISO Summit has been run successfully since 2001 under the name «Risk and Security Exchange»
and from 2004-2009 where it was known as «Swiss Security Exchange». Then came the financial turmoil and the
summit came to a halt. From 2009 onwards, the same successful format has been adopted in Norway where it ran
under the name Sikkerhetstoppmøte. All this experience gained by Prof. Dr. Hämmerli is put into today’s Swiss
CISO Summit.
Who prepares and facilitates?
An organizing committee under the lead of Prof. Dr. Bernhard M. Hämmerli is responsible
for the invitation, preparation and guidance of the discussions. He is an international well
recognized expert with 25 years of information security experience in governments, indus-
try and academia. He is also leading the topic related ICT security platform of the Swiss
academy of engineering sciences SATW. Prof. Dr. Hämmerli is a founding member of the
Information Security Society Switzerland and he built up first information security master
in Lucerne in 1996 respectively 1999. 2009 ongoing, he is also teaching at Norwegian
University of Science and Technology (NTNU), Norway in the technology and management
track of the information security master program.
Agenda (generalized)
12.00	Start with small lunch
13.15	 Welcome & introduction
13.30	 Keynotes from experts or members
14.20	Roundtable session I
15.20	Exchange between the groups and wrap up of the event
15.40	Break
16.00	Roundtable session II
16.50	Exchange between the groups and wrap up of the event
17.10	Summary note
17:30 – 	 Cocktail and Aperitif
The meeting is held three times per year.
Fact Sheet II
Active participation guaranteed!
Dedicated networking – enjoy with
like-minded senior peers
swisscisosummit
7
swisscisosummit
Platinum Sponsor
Detecon Consulting is one of the world’s leading management consulting companies for integrated management
and technology consultancy. Detecon (Schweiz) AG is located in Zurich and bundles Financial Management as well
as ICT Management competences among its roughly 150 employees. The main focus lies on the requirements of
CFOs and CIOs in nearly all industry sectors.
Globally, more than 6000 projects have been implemented successfully. The international spirit and the openness
are reflected not only in the number and origin of our clients from over 160 countries but also in our employees
that are recruited from 30 different nations.
Gold Sponsor
Over the last three decades, Microsoft has consistently transformed the way that people live, work, play and
connect through great technology. We are inspired every day by the genuine belief that we can change the world for
the better. We are driving advances in cloud computing, developing new ways for people to interact with technology
at home, at work and on the move, while ensuring these interactions are secure and the users’ privacy is protected.
Microsoft is a reliable partner helping to protect valuable information in an era of constant targeted attacks and de-
termined adversaries. In the year of 2002 Microsoft has launched its Trustworthy Computing initiative and has since
developed various solutions designed to reduce the burden on information technology officers and enable them to
concentrate on their core business. These solutions increase the resilience of customers’ IT systems on the basis
of the priorities of today’s CIOs and CISOs, and contain an assessment of common risks.
Swiss Ciso Summit Sponsors
Gold Sponsor
Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber
security solutions and services to enterprises, financial institutions, government administrations, defense and
the media industry.
Our team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security
solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation
protection, as well as piracy risk mitigation. Kudelski Security’s global reach and multi-disciplinary incident res-
ponse is reinforced by strategic international partnerships.
8

Recomendados

North European Cybersecurity Cluster - an example of the regional trust platf... por
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
127 visualizações26 slides
Gdpr compliance. Presentation for Consulegis Lawyers network por
Gdpr compliance.  Presentation  for Consulegis Lawyers networkGdpr compliance.  Presentation  for Consulegis Lawyers network
Gdpr compliance. Presentation for Consulegis Lawyers networkBart Van Den Brande
868 visualizações19 slides
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht por
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
312 visualizações22 slides
GDPR security services - Areyou ready ? por
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
1.5K visualizações8 slides
Data Security Breach – knowing the risks and protecting your business por
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
2K visualizações28 slides
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach por
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
296 visualizações17 slides

Mais conteúdo relacionado

Mais procurados

Eversheds Safe Harbor Developments Webinar por
Eversheds Safe Harbor Developments WebinarEversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments WebinarEversheds Sutherland
2.1K visualizações22 slides
20481112 travelmedia congres gdpr in de travelindustrie in 2019 por
20481112 travelmedia congres gdpr in de travelindustrie in 201920481112 travelmedia congres gdpr in de travelindustrie in 2019
20481112 travelmedia congres gdpr in de travelindustrie in 2019Bart Van Den Brande
150 visualizações15 slides
GDPR in a nutshell por
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellData Traction
148 visualizações8 slides
Preparing for GDPR - CRO Insight Journal por
Preparing for GDPR - CRO Insight JournalPreparing for GDPR - CRO Insight Journal
Preparing for GDPR - CRO Insight JournalAlberto Canadè
83 visualizações39 slides
2017 10 26 webinar - gdpr final por
2017 10 26 webinar - gdpr final2017 10 26 webinar - gdpr final
2017 10 26 webinar - gdpr finalBrian Matteson, CISSP CISA
359 visualizações33 slides
GDPR & digital strategy por
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategyProf. Jacques Folon (Ph.D)
498 visualizações165 slides

Mais procurados(19)

Eversheds Safe Harbor Developments Webinar por Eversheds Sutherland
Eversheds Safe Harbor Developments WebinarEversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments Webinar
Eversheds Sutherland2.1K visualizações
20481112 travelmedia congres gdpr in de travelindustrie in 2019 por Bart Van Den Brande
20481112 travelmedia congres gdpr in de travelindustrie in 201920481112 travelmedia congres gdpr in de travelindustrie in 2019
20481112 travelmedia congres gdpr in de travelindustrie in 2019
Bart Van Den Brande150 visualizações
GDPR in a nutshell por Data Traction
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
Data Traction148 visualizações
Preparing for GDPR - CRO Insight Journal por Alberto Canadè
Preparing for GDPR - CRO Insight JournalPreparing for GDPR - CRO Insight Journal
Preparing for GDPR - CRO Insight Journal
Alberto Canadè83 visualizações
Teradata's approach to addressing GDPR por Paul O'Carroll
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
Paul O'Carroll474 visualizações
GDPR Basics - General Data Protection Regulation por Vicky Dallas
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
Vicky Dallas4.2K visualizações
Data Protection Forum meetup 23052017 por John M Walsh
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
John M Walsh162 visualizações
Data Flow Mapping and the EU GDPR por IT Governance Ltd
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
IT Governance Ltd4.6K visualizações
General Data Protection Regulation (GDPR) - Moving from confusion to readiness por Omo Osagiede
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
Omo Osagiede2.4K visualizações
GDPR Workshop por Curt Lewis
GDPR WorkshopGDPR Workshop
GDPR Workshop
Curt Lewis143 visualizações
201704624- e-privacy 2017 - summer edition - 24000 dati por yasoiler
201704624- e-privacy 2017 - summer edition  - 24000 dati201704624- e-privacy 2017 - summer edition  - 24000 dati
201704624- e-privacy 2017 - summer edition - 24000 dati
yasoiler292 visualizações
Jisc GDPR conference por Jisc
Jisc GDPR conferenceJisc GDPR conference
Jisc GDPR conference
Jisc5.4K visualizações
Cloud Computing & IT in the Boardroom por Brendon Noney
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
Brendon Noney178 visualizações
GDPR - a view for the non experts por Claudio Bolla, CISM
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
Claudio Bolla, CISM349 visualizações
GDPR: the legal aspects. By Matthias of theJurists Europe. por Matthias Dobbelaere-Welvaert
GDPR: the legal aspects. By Matthias of theJurists Europe.GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.
Matthias Dobbelaere-Welvaert1.2K visualizações

Destaque

nicole-f.-brown_resume por
nicole-f.-brown_resumenicole-f.-brown_resume
nicole-f.-brown_resumeNicole Henrio-Brown
167 visualizações1 slide
Navegacion por
Navegacion
Navegacion
Navegacion cuentosdejorgebucay
195 visualizações2 slides
CRJU 485; paper one por
CRJU 485; paper oneCRJU 485; paper one
CRJU 485; paper onePaul Seymour
95 visualizações7 slides
касымов акантай+продажа+всем por
касымов акантай+продажа+всемкасымов акантай+продажа+всем
касымов акантай+продажа+всемАкантай Касымов
177 visualizações3 slides
Skolebevis por
SkolebevisSkolebevis
SkolebevisBrian Nissen Hjarnø Tetens
71 visualizações1 slide
Silabus mi bahasa arab 4 smt 1 por
Silabus mi bahasa arab 4 smt 1Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1Agung Alim
167 visualizações7 slides

Destaque(18)

nicole-f.-brown_resume por Nicole Henrio-Brown
nicole-f.-brown_resumenicole-f.-brown_resume
nicole-f.-brown_resume
Nicole Henrio-Brown167 visualizações
CRJU 485; paper one por Paul Seymour
CRJU 485; paper oneCRJU 485; paper one
CRJU 485; paper one
Paul Seymour95 visualizações
Silabus mi bahasa arab 4 smt 1 por Agung Alim
Silabus mi bahasa arab 4 smt 1Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1
Agung Alim167 visualizações
Silabus mi bahasa arab 4 smt 1 por Agung Alim
Silabus mi bahasa arab 4 smt 1Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1
Agung Alim133 visualizações
Mayor o-viejo por kiosco2020
Mayor o-viejoMayor o-viejo
Mayor o-viejo
kiosco2020128 visualizações
Bulletin #31 - Ottawa Launches Another SR&ED Satisfaction Survey por Scitax Advisory Partners LP
Bulletin #31 - Ottawa Launches Another SR&ED Satisfaction SurveyBulletin #31 - Ottawa Launches Another SR&ED Satisfaction Survey
Bulletin #31 - Ottawa Launches Another SR&ED Satisfaction Survey
Scitax Advisory Partners LP130 visualizações
Dinâmica cultos por Marcio da Silva
Dinâmica cultosDinâmica cultos
Dinâmica cultos
Marcio da Silva267 visualizações
Silabus mi bahasa arab 5 smt 1 por Agung Alim
Silabus mi bahasa arab 5 smt 1Silabus mi bahasa arab 5 smt 1
Silabus mi bahasa arab 5 smt 1
Agung Alim608 visualizações
Silabus mi bahasa arab 4 smt 2 por Agung Alim
Silabus mi bahasa arab 4 smt 2Silabus mi bahasa arab 4 smt 2
Silabus mi bahasa arab 4 smt 2
Agung Alim1.6K visualizações
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi... por contactOpinionWay
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
contactOpinionWay1.7K visualizações
Ceramah kajian tindakan konsep dan pelaporan por Azizul Bakar
Ceramah kajian tindakan konsep dan pelaporanCeramah kajian tindakan konsep dan pelaporan
Ceramah kajian tindakan konsep dan pelaporan
Azizul Bakar1.9K visualizações
Curriculum Vitea - Summer 2016 por Steve Swetich
Curriculum Vitea - Summer 2016Curriculum Vitea - Summer 2016
Curriculum Vitea - Summer 2016
Steve Swetich96 visualizações
Kelvin Emmanuel Ng - Brandfolio por Kelvin Emmanuel Ng
Kelvin Emmanuel Ng - BrandfolioKelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng246 visualizações
POPPER Asia - A Brief Introduction por Kelvin Emmanuel Ng
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief Introduction
Kelvin Emmanuel Ng286 visualizações

Similar a Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016

European Corporate Counsel Summit 2015 - Joao Barreiro News Release por
European Corporate Counsel Summit 2015 - Joao Barreiro News ReleaseEuropean Corporate Counsel Summit 2015 - Joao Barreiro News Release
European Corporate Counsel Summit 2015 - Joao Barreiro News ReleaseEmilie Rønn
94 visualizações2 slides
Nordic IT Security 2014 agenda por
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
1.3K visualizações18 slides
13028 fn broschuere_engl por
13028 fn broschuere_engl13028 fn broschuere_engl
13028 fn broschuere_englCON.ECT Eventmanagement
787 visualizações19 slides
Cyber_Risk_in_Switzerland_May_2022.pdf por
Cyber_Risk_in_Switzerland_May_2022.pdfCyber_Risk_in_Switzerland_May_2022.pdf
Cyber_Risk_in_Switzerland_May_2022.pdfGeorgeLekatis2
6 visualizações111 slides
Call for participation smart services summit 2020 por
Call for participation smart services summit 2020Call for participation smart services summit 2020
Call for participation smart services summit 2020Shaun West
439 visualizações2 slides
Big Data LDN 2017: Applied AI for GDPR por
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
166 visualizações25 slides

Similar a Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016(20)

European Corporate Counsel Summit 2015 - Joao Barreiro News Release por Emilie Rønn
European Corporate Counsel Summit 2015 - Joao Barreiro News ReleaseEuropean Corporate Counsel Summit 2015 - Joao Barreiro News Release
European Corporate Counsel Summit 2015 - Joao Barreiro News Release
Emilie Rønn94 visualizações
Nordic IT Security 2014 agenda por Copperberg
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
Copperberg1.3K visualizações
Cyber_Risk_in_Switzerland_May_2022.pdf por GeorgeLekatis2
Cyber_Risk_in_Switzerland_May_2022.pdfCyber_Risk_in_Switzerland_May_2022.pdf
Cyber_Risk_in_Switzerland_May_2022.pdf
GeorgeLekatis26 visualizações
Call for participation smart services summit 2020 por Shaun West
Call for participation smart services summit 2020Call for participation smart services summit 2020
Call for participation smart services summit 2020
Shaun West439 visualizações
Big Data LDN 2017: Applied AI for GDPR por Matt Stubbs
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs166 visualizações
Standards Forum at Sibos 2013 Dubai - full programme por SWIFT
Standards Forum at Sibos 2013 Dubai - full programmeStandards Forum at Sibos 2013 Dubai - full programme
Standards Forum at Sibos 2013 Dubai - full programme
SWIFT2.9K visualizações
Asia 2017 Conference Reviews - The New Gold Rush por The Digital Insurer
 Asia 2017 Conference Reviews - The New Gold Rush Asia 2017 Conference Reviews - The New Gold Rush
Asia 2017 Conference Reviews - The New Gold Rush
The Digital Insurer327 visualizações
Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi... por Shaun West
Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...
Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...
Shaun West140 visualizações
Poročilo o obisku kongresa 2010 luksemburg 22062010 por Zeleno d.o.o.
Poročilo o obisku kongresa 2010 luksemburg 22062010Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010
Zeleno d.o.o.1.2K visualizações
Mi Fid Congress 2007 por tettta
Mi Fid Congress 2007Mi Fid Congress 2007
Mi Fid Congress 2007
tettta1.2K visualizações
Privacy Regulations and Your Digital Setup por Piwik PRO
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital Setup
Piwik PRO8.6K visualizações
617L17_S Int Compliance, Legal Risks and Corp Integrity por Humera Akram
617L17_S Int Compliance, Legal Risks and Corp Integrity617L17_S Int Compliance, Legal Risks and Corp Integrity
617L17_S Int Compliance, Legal Risks and Corp Integrity
Humera Akram1.5K visualizações
biid - NOAH17 London por NOAH Advisors
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
NOAH Advisors492 visualizações
Data Portability & Application Portability - Cloud Security Expo 2017 por CloudWATCH Consortium
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
CloudWATCH Consortium506 visualizações
Pci Europe 2009 Underside Of The Compliance Ecosystem por kpatrickwheeler
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
kpatrickwheeler313 visualizações
The Insurance IoT Opportunity por Matteo Carbone
The Insurance IoT Opportunity The Insurance IoT Opportunity
The Insurance IoT Opportunity
Matteo Carbone4.1K visualizações
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck por e-SIDES.eu
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
e-SIDES.eu135 visualizações

Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016

  • 1. swisscisosummit Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 Personal Invitation to 6th summit Platinum Sponsor Gold Sponsor Gold Sponsor
  • 2. you are kindly invited to the Swiss CISO Summit No. 6 – a series of moderated roundtable discussions for sharing information security practices and strategies among senior professionals. Due there being only a limited number of places, please confirm your attendance as soon as possible. Prof. Dr. Bernhard M. Hämmerli Personal Invitation Time: 12:00h Place: EMA House, Nordstrasse 1, 8006 Zürich, (few minutes walk only from Zurich HB, parking available) KeynoteS: David Rosenthal, Homburger AG: Privacy 2.0: What to expect from the new data protection laws in Europe? Marek Pietrzyk, UBS AG: Integration of Information Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges and experience sharing Focus on strategic discussions: • Privacy and security policy adaption for privacy 2.0 (new privacy acts) • Next generation Information Rights Management: evaluation, implementation and deployment Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 Key benefits are: • Experience industry best practices in the Swiss market • Actively participate in moderated high level peer exchange • Understand drivers for security, gain competence and experience in discussing strategic issues • Design, develop and manage effective information security strategies for your own organization • Receive an exclusive consolidated end of summit report detailing all the major themes discussed for re-use in your organization swisscisosummit Platinum Sponsor Gold Sponsor Gold Sponsor Dear CISO Participant,
  • 3. Keynote I Privacy 2.0: What to expect from the new data protection laws in Europe? 20 years after their creation, the data protection laws in Europe are being revised completely. This is true also for Switzerland. While in some areas life will become easier, in particular for multinationals, overall, the costs of data protection compliance will increase. In addition, fines will increase in case of non-compliance. This presentation will provide an update on what is going on, an overview of key changes in law to expect in the upcoming years, and the resulting challenges companies will have to deal with, with a particular focus on Switzerland. David Rosenthal, counsel at Homburger AG, is one of the opinion leaders in the area of data protection in Switzerland. He has authored a commentary on the Swiss Data Protection Act. He also regularly advises companies on data protection compliance is- sues and disputes as well as the Swiss government, e.g. in connection with its projects to revise Swiss law. He co-heads the IT law practice at Homburger, one of the largest Zurich business law firms, acts as the secretary of the Swiss Association of Corporate Data Protection (VUD) and the Swiss Association of E-Discovery and Investigations (SeDIV) and he lectures at ETHZ and at the University of Basel. Before getting in tothe legal profession, he worked as a journalist and software developer. Keynote II Integration of Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges and experience sharing. The initial step in DRM is policy development in order to protect bank‘s sensitive customer data from unauthorized internal access and uncompliant disclosure, as well as to fulfil bank‘s regula- tory obligations, protect its reputation and avoid financial fines. Evaluation of efficient data protection solutions is the base for a successful implementation. Application of leading edge technology for mastering both, usabili- ty and overall complexity was of paramount importance when implementing and deploying DRM. A review of the impact on daily business processes and end-user experience of the data protection solution is assessing DRM’s business performance. Recommendations in form of a six-step program for establishing a balanced ecosystem for managing sensitive data conclude the presentation. Marek Pietrzyk, director and program manager of the UBS client data confi- dentiality programme DRM is responsible for cost effective implementation of the bank’s sophisticated cyber defence requirements on client data protection. In various positions such as business analyst, strategy consultant, IT architect and project manager, he gained more than twenty years of experience as information security practitioner in the financial industry. He is an author of several publica- tions on software architecture and requirements management and is distingu- ished speaker at major information security, identity management and e-crime conferences with focus on data protection. Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 swisscisosummit 3
  • 4. Round table session I Privacy and security policy adaption for privacy 2.0 Progress and revision of data protection law in the European Union but also in Switzerland will force enter- prises to react. What changes? Where will compliance become easier, and which areas will be particularly demanding when adapting to the new law? Which measures will help companies to protect against fines? How will company policies have to be changed in terms of privacy and security? Exchange between the groups: From each group the major findings will be presented to the audience, such that each participant gets the whole emphasis of the break out discussion. Round table session II Next generation Information Rights Management: evaluation, implementation and deployment Security and privacy policies result in next generation security and privacy requirements. What are the corner- stone requirements in this process? Cost saving implementation builds often a compromise between coverage, usability, user’s acceptance and complexity: What are technical choices and options? How can we create thoughtful user buy-in? What are the challenges for end-user and business processes performance? Introduction to 7th Swiss CISO Summit on Integration of partner and clients into corporate security architecture: The real way to improve the overall security With keynote from Alain Beuchat, Global Information Security Officer GISO, UBS AG Safe-the.date: May 31, 2016, 12-19h for joining Swiss CISO Summit in Swissotel, Zürich Oerlikon Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 swisscisosummit 4
  • 5. Join Swiss CISO Summit Participation is by invitation only. We accept proposals for new participants. The number of participants is limited to max. 40 per summit because the effectiveness of trust circles and sharing are limited with larger groups. Single summit CHF 450.– per participant Three summits CHF 1’000.– per participant (25% discount for booking three consecutive summits) Cancellation Policy Cancellations of registration are free of charge but no later than seven days before the summit. Cancellations received beyond this point will incur 100% of the admission fee. In any case, however, a delegate may be sent at no additional cost. More information is found at www.ciso-summit.ch Content responsibility for the summits lies with Prof. Dr. Bernhard M. Hämmerli Participation Join this peer-to-peer summit for sharing strategies to mitigate latest information security threats. Register by just replying the invitation e-mail with all your details – or by filling out this interactive PDF-form Three consecutive Summits for CHF 1000.– (3 events, summit 6, 7 & 8, this is equal to one year) 6th Swiss CISO Summit, March 8, 2016 for CHF 450.– (single event) Name Surname Organization Street / No. ZIP / City Phone E-Mail Registration swisscisosummit 5
  • 6. What is the Swiss CISO Summit? The Swiss CISO Summit facilitates the exchange of current security challenges and opportunities between secu- rity executives, managers, and thought leaders in Switzerland. Each summit addresses a current hot topic. The strategic dialog and the subsequent discussions are inspired by a keynote speech from well-recognized national and international speakers. The moderated and guided discussions in groups of 8-10 members share views, experiences and strategies. An excerpt of discussion will be written down in the result paper for the participants. Participation is by invitation only. How do we maintain confidentiality? The Swiss CISO Summit is provided as a “closed door” event. This exclusive CISO Executive Membership pro- gram is created for information security and risk executives giving an environment for achieving new ways of thinking and ensuring success in protecting their organizations. The summits are held strictly under «The Chatham House Rules». Why to join the Swiss CISO Summit? The Swiss CISO Summit has a unique concept of creating trusted circles amongst executives, managers and thought leaders. Meeting peers in an advanced business location, having time to network amongst each other and touch current issues are unique opportunities for sharing experiences, and for receiving advice far beyond the discussion at the table. The summits are held strictly under «The Chatham House Rules» which is a ruleset to treat the shared information with full discretion. • Extensive networking opportunities with peers and experts on an on-going basis • Meet with other leading executives to share successes, failures, obstacles and challenges • Learn about the current strategies on managing security threats today and to prepare for the future • Make new connections and equip yourself with insider information on recent projects and achievements What makes the difference? The Swiss CISO Summit has many and diverse benefits for the invited experts. The participants are the focal point of the summit and the meeting is not intended for providers to present solutions or products. Sales is strictly prohibited to the good of open and free CISO information exchange. Fact Sheet I Walk away with the knowledge and insights to make informed decisions on today’s CISO challenges! swisscisosummit 6
  • 7. The history behind the Swiss CISO Summit The Swiss CISO Summit has been run successfully since 2001 under the name «Risk and Security Exchange» and from 2004-2009 where it was known as «Swiss Security Exchange». Then came the financial turmoil and the summit came to a halt. From 2009 onwards, the same successful format has been adopted in Norway where it ran under the name Sikkerhetstoppmøte. All this experience gained by Prof. Dr. Hämmerli is put into today’s Swiss CISO Summit. Who prepares and facilitates? An organizing committee under the lead of Prof. Dr. Bernhard M. Hämmerli is responsible for the invitation, preparation and guidance of the discussions. He is an international well recognized expert with 25 years of information security experience in governments, indus- try and academia. He is also leading the topic related ICT security platform of the Swiss academy of engineering sciences SATW. Prof. Dr. Hämmerli is a founding member of the Information Security Society Switzerland and he built up first information security master in Lucerne in 1996 respectively 1999. 2009 ongoing, he is also teaching at Norwegian University of Science and Technology (NTNU), Norway in the technology and management track of the information security master program. Agenda (generalized) 12.00 Start with small lunch 13.15 Welcome & introduction 13.30 Keynotes from experts or members 14.20 Roundtable session I 15.20 Exchange between the groups and wrap up of the event 15.40 Break 16.00 Roundtable session II 16.50 Exchange between the groups and wrap up of the event 17.10 Summary note 17:30 – Cocktail and Aperitif The meeting is held three times per year. Fact Sheet II Active participation guaranteed! Dedicated networking – enjoy with like-minded senior peers swisscisosummit 7
  • 8. swisscisosummit Platinum Sponsor Detecon Consulting is one of the world’s leading management consulting companies for integrated management and technology consultancy. Detecon (Schweiz) AG is located in Zurich and bundles Financial Management as well as ICT Management competences among its roughly 150 employees. The main focus lies on the requirements of CFOs and CIOs in nearly all industry sectors. Globally, more than 6000 projects have been implemented successfully. The international spirit and the openness are reflected not only in the number and origin of our clients from over 160 countries but also in our employees that are recruited from 30 different nations. Gold Sponsor Over the last three decades, Microsoft has consistently transformed the way that people live, work, play and connect through great technology. We are inspired every day by the genuine belief that we can change the world for the better. We are driving advances in cloud computing, developing new ways for people to interact with technology at home, at work and on the move, while ensuring these interactions are secure and the users’ privacy is protected. Microsoft is a reliable partner helping to protect valuable information in an era of constant targeted attacks and de- termined adversaries. In the year of 2002 Microsoft has launched its Trustworthy Computing initiative and has since developed various solutions designed to reduce the burden on information technology officers and enable them to concentrate on their core business. These solutions increase the resilience of customers’ IT systems on the basis of the priorities of today’s CIOs and CISOs, and contain an assessment of common risks. Swiss Ciso Summit Sponsors Gold Sponsor Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber security solutions and services to enterprises, financial institutions, government administrations, defense and the media industry. Our team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation protection, as well as piracy risk mitigation. Kudelski Security’s global reach and multi-disciplinary incident res- ponse is reinforced by strategic international partnerships. 8