SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
swisscisosummit
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
Personal Invitation to 6th
summit
Platinum Sponsor Gold Sponsor Gold Sponsor
you are kindly invited to the Swiss CISO Summit No. 6 – a series of moderated roundtable discussions for
sharing information security practices and strategies among senior professionals.
Due there being only a limited number of places, please confirm your attendance as soon as possible.
Prof. Dr. Bernhard M. Hämmerli
Personal Invitation
Time: 12:00h
Place: EMA House, Nordstrasse 1, 8006 Zürich, (few minutes walk only from Zurich HB, parking available)
KeynoteS:
David Rosenthal, Homburger AG: Privacy 2.0: What to expect from the new data protection laws in Europe?
Marek Pietrzyk, UBS AG: Integration of Information Digital Rights Management (DRM) in IT Infrastructure
and Business Processes: challenges and experience sharing
Focus on strategic discussions:
•	Privacy and security policy adaption for privacy 2.0 (new privacy acts)
•	Next generation Information Rights Management: evaluation, implementation and deployment
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
Key benefits are:
•	Experience industry best practices in the Swiss market
•	Actively participate in moderated high level peer exchange
•	Understand drivers for security, gain competence and experience in discussing strategic issues
•	Design, develop and manage effective information security strategies for your own organization
•	Receive an exclusive consolidated end of summit report detailing all the major themes discussed for re-use in 	
	 your organization
swisscisosummit
Platinum Sponsor Gold Sponsor Gold Sponsor
Dear CISO Participant,
Keynote I
Privacy 2.0: What to expect from the new data protection laws in Europe? 20 years after their creation, the
data protection laws in Europe are being revised completely. This is true also for Switzerland. While in some
areas life will become easier, in particular for multinationals, overall, the costs of data protection compliance
will increase. In addition, fines will increase in case of non-compliance. This presentation will provide an update
on what is going on, an overview of key changes in law to expect in the upcoming years, and the resulting
challenges companies will have to deal with, with a particular focus on Switzerland.
David Rosenthal, counsel at Homburger AG, is one of the opinion leaders in the area
of data protection in Switzerland. He has authored a commentary on the Swiss Data
Protection Act. He also regularly advises companies on data protection compliance is-
sues and disputes as well as the Swiss government, e.g. in connection with its projects
to revise Swiss law. He co-heads the IT law practice at Homburger, one of the largest
Zurich business law firms, acts as the secretary of the Swiss Association of Corporate
Data Protection (VUD) and the Swiss Association of E-Discovery and Investigations
(SeDIV) and he lectures at ETHZ and at the University of Basel. Before getting in tothe
legal profession, he worked as a journalist and software developer.
Keynote II
Integration of Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges
and experience sharing. The initial step in DRM is policy development in order to protect bank‘s sensitive
customer data from unauthorized internal access and uncompliant disclosure, as well as to fulfil bank‘s regula-
tory obligations, protect its reputation and avoid financial fines. Evaluation of efficient data protection solutions
is the base for a successful implementation. Application of leading edge technology for mastering both, usabili-
ty and overall complexity was of paramount importance when implementing and deploying DRM. A review of the
impact on daily business processes and end-user experience of the data protection solution is assessing DRM’s
business performance. Recommendations in form of a six-step program for establishing a balanced ecosystem
for managing sensitive data conclude the presentation.
Marek Pietrzyk, director and program manager of the UBS client data confi-
dentiality programme DRM is responsible for cost effective implementation of
the bank’s sophisticated cyber defence requirements on client data protection. In
various positions such as business analyst, strategy consultant, IT architect and
project manager, he gained more than twenty years of experience as information
security practitioner in the financial industry. He is an author of several publica-
tions on software architecture and requirements management and is distingu-
ished speaker at major information security, identity management and e-crime
conferences with focus on data protection.
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
swisscisosummit
3
Round table session I	
Privacy and security policy adaption for privacy 2.0
Progress and revision of data protection law in the European Union but also in Switzerland will force enter-
prises to react. What changes? Where will compliance become easier, and which areas will be particularly
demanding when adapting to the new law? Which measures will help companies to protect against fines?
How will company policies have to be changed in terms of privacy and security?
Exchange between the groups: From each group the major findings will be presented to the audience,
such that each participant gets the whole emphasis of the break out discussion.
Round table session II
Next generation Information Rights Management: evaluation, implementation and deployment
Security and privacy policies result in next generation security and privacy requirements. What are the corner-
stone requirements in this process?
Cost saving implementation builds often a compromise between coverage, usability, user’s acceptance and
complexity: What are technical choices and options? How can we create thoughtful user buy-in? What are the
challenges for end-user and business processes performance?
Introduction to 7th
Swiss CISO Summit on
Integration of partner and clients into corporate security architecture:
The real way to improve the overall security
With keynote from Alain Beuchat, Global Information Security Officer GISO, UBS AG
Safe-the.date: May 31, 2016, 12-19h for joining Swiss CISO Summit in Swissotel, Zürich Oerlikon
Information Rights Management (IRM) and Digital Rights Management
(DRM) & new European Privacy Act: Identifying Implementation Options
March 8, 2016
swisscisosummit
4
Join Swiss CISO Summit
Participation is by invitation only. We accept proposals for new participants. The number of participants is limited
to max. 40 per summit because the effectiveness of trust circles and sharing are limited with larger groups.
Single summit	 CHF 450.– per participant
Three summits	 CHF 1’000.– per participant (25% discount for booking three consecutive summits)
Cancellation Policy
Cancellations of registration are free of charge but no later than seven days before the summit. Cancellations
received beyond this point will incur 100% of the admission fee. In any case, however, a delegate may be sent at
no additional cost.
More information is found at www.ciso-summit.ch
Content responsibility for the summits lies with Prof. Dr. Bernhard M. Hämmerli
Participation
Join this peer-to-peer summit for
sharing strategies to mitigate latest
information security threats.
Register by just replying the invitation e-mail with all your details – or by filling out this interactive PDF-form
	 Three consecutive Summits for CHF 1000.– (3 events, summit 6, 7 & 8, this is equal to one year)
	 6th
Swiss CISO Summit, March 8, 2016 for CHF 450.– (single event)	
Name	Surname
Organization
Street / No.	 ZIP / City
Phone	E-Mail
Registration
swisscisosummit
5
What is the Swiss CISO Summit?
The Swiss CISO Summit facilitates the exchange of current security challenges and opportunities between secu-
rity executives, managers, and thought leaders in Switzerland. Each summit addresses a current hot topic. The
strategic dialog and the subsequent discussions are inspired by a keynote speech from well-recognized national
and international speakers. The moderated and guided discussions in groups of 8-10 members share views,
experiences and strategies. An excerpt of discussion will be written down in the result paper for the participants.
Participation is by invitation only.
How do we maintain confidentiality?
The Swiss CISO Summit is provided as a “closed door” event. This exclusive CISO Executive Membership pro-
gram is created for information security and risk executives giving an environment for achieving new ways of
thinking and ensuring success in protecting their organizations.
The summits are held strictly under «The Chatham House Rules».
Why to join the Swiss CISO Summit?
The Swiss CISO Summit has a unique concept of creating trusted circles amongst executives, managers and
thought leaders. Meeting peers in an advanced business location, having time to network amongst each other
and touch current issues are unique opportunities for sharing experiences, and for receiving advice far beyond
the discussion at the table. The summits are held strictly under «The Chatham House Rules» which is a ruleset
to treat the shared information with full discretion.
•	Extensive networking opportunities with peers and experts on an on-going basis
•	Meet with other leading executives to share successes, failures, obstacles and challenges
•	Learn about the current strategies on managing security threats today and to prepare for the future
•	Make new connections and equip yourself with insider information on recent projects and achievements
What makes the difference?
The Swiss CISO Summit has many and diverse benefits for the invited experts. The participants are the focal
point of the summit and the meeting is not intended for providers to present solutions or products. Sales
is strictly prohibited to the good of open and free CISO information exchange.
Fact Sheet I
Walk away with the knowledge
and insights to make informed decisions
on today’s CISO challenges!
swisscisosummit
6
The history behind the Swiss CISO Summit
The Swiss CISO Summit has been run successfully since 2001 under the name «Risk and Security Exchange»
and from 2004-2009 where it was known as «Swiss Security Exchange». Then came the financial turmoil and the
summit came to a halt. From 2009 onwards, the same successful format has been adopted in Norway where it ran
under the name Sikkerhetstoppmøte. All this experience gained by Prof. Dr. Hämmerli is put into today’s Swiss
CISO Summit.
Who prepares and facilitates?
An organizing committee under the lead of Prof. Dr. Bernhard M. Hämmerli is responsible
for the invitation, preparation and guidance of the discussions. He is an international well
recognized expert with 25 years of information security experience in governments, indus-
try and academia. He is also leading the topic related ICT security platform of the Swiss
academy of engineering sciences SATW. Prof. Dr. Hämmerli is a founding member of the
Information Security Society Switzerland and he built up first information security master
in Lucerne in 1996 respectively 1999. 2009 ongoing, he is also teaching at Norwegian
University of Science and Technology (NTNU), Norway in the technology and management
track of the information security master program.
Agenda (generalized)
12.00	Start with small lunch
13.15	 Welcome & introduction
13.30	 Keynotes from experts or members
14.20	Roundtable session I
15.20	Exchange between the groups and wrap up of the event
15.40	Break
16.00	Roundtable session II
16.50	Exchange between the groups and wrap up of the event
17.10	Summary note
17:30 – 	 Cocktail and Aperitif
The meeting is held three times per year.
Fact Sheet II
Active participation guaranteed!
Dedicated networking – enjoy with
like-minded senior peers
swisscisosummit
7
swisscisosummit
Platinum Sponsor
Detecon Consulting is one of the world’s leading management consulting companies for integrated management
and technology consultancy. Detecon (Schweiz) AG is located in Zurich and bundles Financial Management as well
as ICT Management competences among its roughly 150 employees. The main focus lies on the requirements of
CFOs and CIOs in nearly all industry sectors.
Globally, more than 6000 projects have been implemented successfully. The international spirit and the openness
are reflected not only in the number and origin of our clients from over 160 countries but also in our employees
that are recruited from 30 different nations.
Gold Sponsor
Over the last three decades, Microsoft has consistently transformed the way that people live, work, play and
connect through great technology. We are inspired every day by the genuine belief that we can change the world for
the better. We are driving advances in cloud computing, developing new ways for people to interact with technology
at home, at work and on the move, while ensuring these interactions are secure and the users’ privacy is protected.
Microsoft is a reliable partner helping to protect valuable information in an era of constant targeted attacks and de-
termined adversaries. In the year of 2002 Microsoft has launched its Trustworthy Computing initiative and has since
developed various solutions designed to reduce the burden on information technology officers and enable them to
concentrate on their core business. These solutions increase the resilience of customers’ IT systems on the basis
of the priorities of today’s CIOs and CISOs, and contain an assessment of common risks.
Swiss Ciso Summit Sponsors
Gold Sponsor
Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber
security solutions and services to enterprises, financial institutions, government administrations, defense and
the media industry.
Our team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security
solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation
protection, as well as piracy risk mitigation. Kudelski Security’s global reach and multi-disciplinary incident res-
ponse is reinforced by strategic international partnerships.
8

Mais conteúdo relacionado

Mais procurados

Eversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments WebinarEversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments Webinar
Eversheds Sutherland
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!

Mais procurados (19)

Eversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments WebinarEversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments Webinar
 
20481112 travelmedia congres gdpr in de travelindustrie in 2019
20481112 travelmedia congres gdpr in de travelindustrie in 201920481112 travelmedia congres gdpr in de travelindustrie in 2019
20481112 travelmedia congres gdpr in de travelindustrie in 2019
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 
Preparing for GDPR - CRO Insight Journal
Preparing for GDPR - CRO Insight JournalPreparing for GDPR - CRO Insight Journal
Preparing for GDPR - CRO Insight Journal
 
2017 10 26 webinar - gdpr final
2017 10 26 webinar - gdpr final2017 10 26 webinar - gdpr final
2017 10 26 webinar - gdpr final
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readinessGeneral Data Protection Regulation (GDPR) - Moving from confusion to readiness
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
 
201704624- e-privacy 2017 - summer edition - 24000 dati
201704624- e-privacy 2017 - summer edition  - 24000 dati201704624- e-privacy 2017 - summer edition  - 24000 dati
201704624- e-privacy 2017 - summer edition - 24000 dati
 
Jisc GDPR conference
Jisc GDPR conferenceJisc GDPR conference
Jisc GDPR conference
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.
 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 

Destaque

CRJU 485; paper one
CRJU 485; paper oneCRJU 485; paper one
CRJU 485; paper one
Paul Seymour
 
Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1
Agung Alim
 
Ceramah kajian tindakan konsep dan pelaporan
Ceramah kajian tindakan konsep dan pelaporanCeramah kajian tindakan konsep dan pelaporan
Ceramah kajian tindakan konsep dan pelaporan
Azizul Bakar
 
Curriculum Vitea - Summer 2016
Curriculum Vitea - Summer 2016Curriculum Vitea - Summer 2016
Curriculum Vitea - Summer 2016
Steve Swetich
 
Kelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng - BrandfolioKelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief Introduction
Kelvin Emmanuel Ng
 

Destaque (18)

nicole-f.-brown_resume
nicole-f.-brown_resumenicole-f.-brown_resume
nicole-f.-brown_resume
 
Navegacion
Navegacion
Navegacion
Navegacion
 
CRJU 485; paper one
CRJU 485; paper oneCRJU 485; paper one
CRJU 485; paper one
 
касымов акантай+продажа+всем
касымов акантай+продажа+всемкасымов акантай+продажа+всем
касымов акантай+продажа+всем
 
Skolebevis
SkolebevisSkolebevis
Skolebevis
 
Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1
 
Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1Silabus mi bahasa arab 4 smt 1
Silabus mi bahasa arab 4 smt 1
 
скупой рыцарь
скупой рыцарьскупой рыцарь
скупой рыцарь
 
Mayor o-viejo
Mayor o-viejoMayor o-viejo
Mayor o-viejo
 
Bulletin #31 - Ottawa Launches Another SR&ED Satisfaction Survey
Bulletin #31 - Ottawa Launches Another SR&ED Satisfaction SurveyBulletin #31 - Ottawa Launches Another SR&ED Satisfaction Survey
Bulletin #31 - Ottawa Launches Another SR&ED Satisfaction Survey
 
Dinâmica cultos
Dinâmica cultosDinâmica cultos
Dinâmica cultos
 
Silabus mi bahasa arab 5 smt 1
Silabus mi bahasa arab 5 smt 1Silabus mi bahasa arab 5 smt 1
Silabus mi bahasa arab 5 smt 1
 
Silabus mi bahasa arab 4 smt 2
Silabus mi bahasa arab 4 smt 2Silabus mi bahasa arab 4 smt 2
Silabus mi bahasa arab 4 smt 2
 
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
 
Ceramah kajian tindakan konsep dan pelaporan
Ceramah kajian tindakan konsep dan pelaporanCeramah kajian tindakan konsep dan pelaporan
Ceramah kajian tindakan konsep dan pelaporan
 
Curriculum Vitea - Summer 2016
Curriculum Vitea - Summer 2016Curriculum Vitea - Summer 2016
Curriculum Vitea - Summer 2016
 
Kelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng - BrandfolioKelvin Emmanuel Ng - Brandfolio
Kelvin Emmanuel Ng - Brandfolio
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief Introduction
 

Semelhante a Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016

European Corporate Counsel Summit 2015 - Joao Barreiro News Release
European Corporate Counsel Summit 2015 - Joao Barreiro News ReleaseEuropean Corporate Counsel Summit 2015 - Joao Barreiro News Release
European Corporate Counsel Summit 2015 - Joao Barreiro News Release
Emilie Rønn
 
Mi Fid Congress 2007
Mi Fid Congress 2007Mi Fid Congress 2007
Mi Fid Congress 2007
tettta
 
617L17_S Int Compliance, Legal Risks and Corp Integrity
617L17_S Int Compliance, Legal Risks and Corp Integrity617L17_S Int Compliance, Legal Risks and Corp Integrity
617L17_S Int Compliance, Legal Risks and Corp Integrity
Humera Akram
 
S2_1_4 Shype.pdf ok to publish eu pitch battle
S2_1_4 Shype.pdf ok to publish eu pitch battleS2_1_4 Shype.pdf ok to publish eu pitch battle
S2_1_4 Shype.pdf ok to publish eu pitch battle
FinTech Belgium
 

Semelhante a Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016 (20)

European Corporate Counsel Summit 2015 - Joao Barreiro News Release
European Corporate Counsel Summit 2015 - Joao Barreiro News ReleaseEuropean Corporate Counsel Summit 2015 - Joao Barreiro News Release
European Corporate Counsel Summit 2015 - Joao Barreiro News Release
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
13028 fn broschuere_engl
13028 fn broschuere_engl13028 fn broschuere_engl
13028 fn broschuere_engl
 
Cyber_Risk_in_Switzerland_May_2022.pdf
Cyber_Risk_in_Switzerland_May_2022.pdfCyber_Risk_in_Switzerland_May_2022.pdf
Cyber_Risk_in_Switzerland_May_2022.pdf
 
Call for participation smart services summit 2020
Call for participation smart services summit 2020Call for participation smart services summit 2020
Call for participation smart services summit 2020
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Asia 2017 Conference Reviews - The New Gold Rush
 Asia 2017 Conference Reviews - The New Gold Rush Asia 2017 Conference Reviews - The New Gold Rush
Asia 2017 Conference Reviews - The New Gold Rush
 
Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...
Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...
Second SMART SERVICES SUMMIT 2019 - Decision Making Services for Capital Equi...
 
Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010
 
Mi Fid Congress 2007
Mi Fid Congress 2007Mi Fid Congress 2007
Mi Fid Congress 2007
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital Setup
 
617L17_S Int Compliance, Legal Risks and Corp Integrity
617L17_S Int Compliance, Legal Risks and Corp Integrity617L17_S Int Compliance, Legal Risks and Corp Integrity
617L17_S Int Compliance, Legal Risks and Corp Integrity
 
biid - NOAH17 London
biid - NOAH17 Londonbiid - NOAH17 London
biid - NOAH17 London
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
GARTNER,ISF CORPORATE INTELLIGENCE AND ATHINA
GARTNER,ISF CORPORATE INTELLIGENCE AND ATHINAGARTNER,ISF CORPORATE INTELLIGENCE AND ATHINA
GARTNER,ISF CORPORATE INTELLIGENCE AND ATHINA
 
BSI British Standards Information Governance Workshop Presentation
BSI British Standards Information Governance Workshop Presentation BSI British Standards Information Governance Workshop Presentation
BSI British Standards Information Governance Workshop Presentation
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
S2_1_4 Shype.pdf ok to publish eu pitch battle
S2_1_4 Shype.pdf ok to publish eu pitch battleS2_1_4 Shype.pdf ok to publish eu pitch battle
S2_1_4 Shype.pdf ok to publish eu pitch battle
 
The Insurance IoT Opportunity
The Insurance IoT Opportunity The Insurance IoT Opportunity
The Insurance IoT Opportunity
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 

Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Management evaluation implementation and deployment - March 2016

  • 1. swisscisosummit Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 Personal Invitation to 6th summit Platinum Sponsor Gold Sponsor Gold Sponsor
  • 2. you are kindly invited to the Swiss CISO Summit No. 6 – a series of moderated roundtable discussions for sharing information security practices and strategies among senior professionals. Due there being only a limited number of places, please confirm your attendance as soon as possible. Prof. Dr. Bernhard M. Hämmerli Personal Invitation Time: 12:00h Place: EMA House, Nordstrasse 1, 8006 Zürich, (few minutes walk only from Zurich HB, parking available) KeynoteS: David Rosenthal, Homburger AG: Privacy 2.0: What to expect from the new data protection laws in Europe? Marek Pietrzyk, UBS AG: Integration of Information Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges and experience sharing Focus on strategic discussions: • Privacy and security policy adaption for privacy 2.0 (new privacy acts) • Next generation Information Rights Management: evaluation, implementation and deployment Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 Key benefits are: • Experience industry best practices in the Swiss market • Actively participate in moderated high level peer exchange • Understand drivers for security, gain competence and experience in discussing strategic issues • Design, develop and manage effective information security strategies for your own organization • Receive an exclusive consolidated end of summit report detailing all the major themes discussed for re-use in your organization swisscisosummit Platinum Sponsor Gold Sponsor Gold Sponsor Dear CISO Participant,
  • 3. Keynote I Privacy 2.0: What to expect from the new data protection laws in Europe? 20 years after their creation, the data protection laws in Europe are being revised completely. This is true also for Switzerland. While in some areas life will become easier, in particular for multinationals, overall, the costs of data protection compliance will increase. In addition, fines will increase in case of non-compliance. This presentation will provide an update on what is going on, an overview of key changes in law to expect in the upcoming years, and the resulting challenges companies will have to deal with, with a particular focus on Switzerland. David Rosenthal, counsel at Homburger AG, is one of the opinion leaders in the area of data protection in Switzerland. He has authored a commentary on the Swiss Data Protection Act. He also regularly advises companies on data protection compliance is- sues and disputes as well as the Swiss government, e.g. in connection with its projects to revise Swiss law. He co-heads the IT law practice at Homburger, one of the largest Zurich business law firms, acts as the secretary of the Swiss Association of Corporate Data Protection (VUD) and the Swiss Association of E-Discovery and Investigations (SeDIV) and he lectures at ETHZ and at the University of Basel. Before getting in tothe legal profession, he worked as a journalist and software developer. Keynote II Integration of Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges and experience sharing. The initial step in DRM is policy development in order to protect bank‘s sensitive customer data from unauthorized internal access and uncompliant disclosure, as well as to fulfil bank‘s regula- tory obligations, protect its reputation and avoid financial fines. Evaluation of efficient data protection solutions is the base for a successful implementation. Application of leading edge technology for mastering both, usabili- ty and overall complexity was of paramount importance when implementing and deploying DRM. A review of the impact on daily business processes and end-user experience of the data protection solution is assessing DRM’s business performance. Recommendations in form of a six-step program for establishing a balanced ecosystem for managing sensitive data conclude the presentation. Marek Pietrzyk, director and program manager of the UBS client data confi- dentiality programme DRM is responsible for cost effective implementation of the bank’s sophisticated cyber defence requirements on client data protection. In various positions such as business analyst, strategy consultant, IT architect and project manager, he gained more than twenty years of experience as information security practitioner in the financial industry. He is an author of several publica- tions on software architecture and requirements management and is distingu- ished speaker at major information security, identity management and e-crime conferences with focus on data protection. Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 swisscisosummit 3
  • 4. Round table session I Privacy and security policy adaption for privacy 2.0 Progress and revision of data protection law in the European Union but also in Switzerland will force enter- prises to react. What changes? Where will compliance become easier, and which areas will be particularly demanding when adapting to the new law? Which measures will help companies to protect against fines? How will company policies have to be changed in terms of privacy and security? Exchange between the groups: From each group the major findings will be presented to the audience, such that each participant gets the whole emphasis of the break out discussion. Round table session II Next generation Information Rights Management: evaluation, implementation and deployment Security and privacy policies result in next generation security and privacy requirements. What are the corner- stone requirements in this process? Cost saving implementation builds often a compromise between coverage, usability, user’s acceptance and complexity: What are technical choices and options? How can we create thoughtful user buy-in? What are the challenges for end-user and business processes performance? Introduction to 7th Swiss CISO Summit on Integration of partner and clients into corporate security architecture: The real way to improve the overall security With keynote from Alain Beuchat, Global Information Security Officer GISO, UBS AG Safe-the.date: May 31, 2016, 12-19h for joining Swiss CISO Summit in Swissotel, Zürich Oerlikon Information Rights Management (IRM) and Digital Rights Management (DRM) & new European Privacy Act: Identifying Implementation Options March 8, 2016 swisscisosummit 4
  • 5. Join Swiss CISO Summit Participation is by invitation only. We accept proposals for new participants. The number of participants is limited to max. 40 per summit because the effectiveness of trust circles and sharing are limited with larger groups. Single summit CHF 450.– per participant Three summits CHF 1’000.– per participant (25% discount for booking three consecutive summits) Cancellation Policy Cancellations of registration are free of charge but no later than seven days before the summit. Cancellations received beyond this point will incur 100% of the admission fee. In any case, however, a delegate may be sent at no additional cost. More information is found at www.ciso-summit.ch Content responsibility for the summits lies with Prof. Dr. Bernhard M. Hämmerli Participation Join this peer-to-peer summit for sharing strategies to mitigate latest information security threats. Register by just replying the invitation e-mail with all your details – or by filling out this interactive PDF-form Three consecutive Summits for CHF 1000.– (3 events, summit 6, 7 & 8, this is equal to one year) 6th Swiss CISO Summit, March 8, 2016 for CHF 450.– (single event) Name Surname Organization Street / No. ZIP / City Phone E-Mail Registration swisscisosummit 5
  • 6. What is the Swiss CISO Summit? The Swiss CISO Summit facilitates the exchange of current security challenges and opportunities between secu- rity executives, managers, and thought leaders in Switzerland. Each summit addresses a current hot topic. The strategic dialog and the subsequent discussions are inspired by a keynote speech from well-recognized national and international speakers. The moderated and guided discussions in groups of 8-10 members share views, experiences and strategies. An excerpt of discussion will be written down in the result paper for the participants. Participation is by invitation only. How do we maintain confidentiality? The Swiss CISO Summit is provided as a “closed door” event. This exclusive CISO Executive Membership pro- gram is created for information security and risk executives giving an environment for achieving new ways of thinking and ensuring success in protecting their organizations. The summits are held strictly under «The Chatham House Rules». Why to join the Swiss CISO Summit? The Swiss CISO Summit has a unique concept of creating trusted circles amongst executives, managers and thought leaders. Meeting peers in an advanced business location, having time to network amongst each other and touch current issues are unique opportunities for sharing experiences, and for receiving advice far beyond the discussion at the table. The summits are held strictly under «The Chatham House Rules» which is a ruleset to treat the shared information with full discretion. • Extensive networking opportunities with peers and experts on an on-going basis • Meet with other leading executives to share successes, failures, obstacles and challenges • Learn about the current strategies on managing security threats today and to prepare for the future • Make new connections and equip yourself with insider information on recent projects and achievements What makes the difference? The Swiss CISO Summit has many and diverse benefits for the invited experts. The participants are the focal point of the summit and the meeting is not intended for providers to present solutions or products. Sales is strictly prohibited to the good of open and free CISO information exchange. Fact Sheet I Walk away with the knowledge and insights to make informed decisions on today’s CISO challenges! swisscisosummit 6
  • 7. The history behind the Swiss CISO Summit The Swiss CISO Summit has been run successfully since 2001 under the name «Risk and Security Exchange» and from 2004-2009 where it was known as «Swiss Security Exchange». Then came the financial turmoil and the summit came to a halt. From 2009 onwards, the same successful format has been adopted in Norway where it ran under the name Sikkerhetstoppmøte. All this experience gained by Prof. Dr. Hämmerli is put into today’s Swiss CISO Summit. Who prepares and facilitates? An organizing committee under the lead of Prof. Dr. Bernhard M. Hämmerli is responsible for the invitation, preparation and guidance of the discussions. He is an international well recognized expert with 25 years of information security experience in governments, indus- try and academia. He is also leading the topic related ICT security platform of the Swiss academy of engineering sciences SATW. Prof. Dr. Hämmerli is a founding member of the Information Security Society Switzerland and he built up first information security master in Lucerne in 1996 respectively 1999. 2009 ongoing, he is also teaching at Norwegian University of Science and Technology (NTNU), Norway in the technology and management track of the information security master program. Agenda (generalized) 12.00 Start with small lunch 13.15 Welcome & introduction 13.30 Keynotes from experts or members 14.20 Roundtable session I 15.20 Exchange between the groups and wrap up of the event 15.40 Break 16.00 Roundtable session II 16.50 Exchange between the groups and wrap up of the event 17.10 Summary note 17:30 – Cocktail and Aperitif The meeting is held three times per year. Fact Sheet II Active participation guaranteed! Dedicated networking – enjoy with like-minded senior peers swisscisosummit 7
  • 8. swisscisosummit Platinum Sponsor Detecon Consulting is one of the world’s leading management consulting companies for integrated management and technology consultancy. Detecon (Schweiz) AG is located in Zurich and bundles Financial Management as well as ICT Management competences among its roughly 150 employees. The main focus lies on the requirements of CFOs and CIOs in nearly all industry sectors. Globally, more than 6000 projects have been implemented successfully. The international spirit and the openness are reflected not only in the number and origin of our clients from over 160 countries but also in our employees that are recruited from 30 different nations. Gold Sponsor Over the last three decades, Microsoft has consistently transformed the way that people live, work, play and connect through great technology. We are inspired every day by the genuine belief that we can change the world for the better. We are driving advances in cloud computing, developing new ways for people to interact with technology at home, at work and on the move, while ensuring these interactions are secure and the users’ privacy is protected. Microsoft is a reliable partner helping to protect valuable information in an era of constant targeted attacks and de- termined adversaries. In the year of 2002 Microsoft has launched its Trustworthy Computing initiative and has since developed various solutions designed to reduce the burden on information technology officers and enable them to concentrate on their core business. These solutions increase the resilience of customers’ IT systems on the basis of the priorities of today’s CIOs and CISOs, and contain an assessment of common risks. Swiss Ciso Summit Sponsors Gold Sponsor Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber security solutions and services to enterprises, financial institutions, government administrations, defense and the media industry. Our team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation protection, as well as piracy risk mitigation. Kudelski Security’s global reach and multi-disciplinary incident res- ponse is reinforced by strategic international partnerships. 8