11:30 | Workshops 1 to 3 parallel: Workshop 1: Current developments in basic IT protection Moderation: Thomas Biere, Federal Office for Information Security (BSI), Bonn In the first part of the workshop an overview of the approach and methodology as well as the current developments of BSI basic protection will be given. The second part of the workshop takes up current questions of the participants and presents a best-practice approach with which access to areas and documents with different security levels can be realised on a workstation. Workshop 2: Necessary infrastructure for the practical use of the new identity card Moderation: Holger Funke, HJP Consulting GmbH, Borchen Since the introduction of the new electronic identity card, more than 10 million citizens are now equipped with an identity card. This workshop will explain what infrastructure is needed in companies and organizations to actually use the new possibilities offered by the electronic ID card. Which technical components does a company need to access the data of the identity card? Which legal requirements exist? What costs are incurred by a company? Is it sufficient to consider only the technical components? Such questions will be clarified in this workshop. Holger Funke is Technical Director at HJP Consulting and has been working on specifications for sovereign documents such as passports and ID cards since 2004. Workshop 3: Privacy in the cloud Moderation: Manfred Schneider, pro DS Data protection and data security consulting, Paderborn Google, Telekom, Apple, DATEV and others offer us to process our data cost-effectively in their "clouds". Dynamic and scalable use of external hardware and software, including the necessary know-how, can be good reasons to choose cloud computing. If, however, personal data of employees, business partners, customers or even patients are processed in this way, it must be checked in advance whether and which data protection regulations might conflict with this type of processing. The aim of the workshop is to classify various cloud computing offerings (SaaS, IaaS, etc.) in terms of data protection law and to develop concrete recommendations for action. |
14:15 | Workshops 4 to 6 parallel: Workshop 4: Protection of smartphones in the business sector Moderation: Niko Rabke, neam IT-Services GmbH, Paderborn Today almost everyone owns a smartphone. It is also hard to imagine the business world without them, but few people know what risks this entails. Not only computers, but also mobile devices require consistent care and maintenance in order not to present a security risk. In this workshop you will learn about the possibilities for securing technologies such as smartphones and tablet PCs. Workshop 5: Requirements for cloud offerings from the perspective of SMEs and the BSI Moderation: Sabrina Eßer, unilab AG, Paderborn; Dr. Gudrun Oevel, Paderborn University In the first part of the workshop, requirements for cloud computing in SMEs from project practice will be presented and discussed. In the second part, the topic "Security in the Cloud" will be discussed based on the requirements from the point of view of the BSI and finally, the opportunities will be compared to the risks in the area of security. Workshop 6: Data protection in social networks Moderation: Carola Sieling, lawyer and specialist lawyer for information technology law, Law Office Sieling, Paderborn Social networks are an indispensable part of B2C business. However, there are also dangers lurking here, such as being warned by competitors or attracting the attention of data protection supervisory authorities. In this workshop you will learn what you have to consider when using social media marketing tools such as Facebook, Google+, XING and Co. in terms of data protection. What needs to be considered, for example, when web tracking or personalized advertising to customers? Can the Like button of Facebook be used or not? |