By now, most people with an interest in Tech have heard about the General Data Protection Regulation (https://en.wikipedia.org/wiki/General_Data_Protection_Regulation) that becomes effective in May 2018. But what exactly does it mean? How is it going to affect the IT-industry? And what should be done to full fill its requirements? These are some of the questions that we are going to investigate, led by our speakers from Innovate Security and Lilsis AB.
Innovate Security (http://innovatesecurity.se/)
How do we model for GDPR?
Laura, Daniel and Tony from Innovate Security will talk about the basics of GDPR, and how to help your organization get ready for the new law through appropriate modelling. The ground for success with this is to figure out and create a common vision of the information that is handled in the business processes and its IT support. How well do Excel-lists actually work for this, and how should you think instead?
Bachelor of Law from Montpellier, Master of Information Security from Uppsala. Laura is a lawyer with deep knowledge in GDPR and information security.
Doctor of theoretical physics with 15 years experience in IT architecture, including as chief architect at Eniro and Riksbyggen. Daniel has been responsible for both comprehensive and detailed solution architecture in major business systems projects, and has driven IT management and management issues.
Quality strategist working with IT startups and entrepreneurs to quality assure their IT and technologies. Tony started as a developer in the startup world 8 years ago and then transitioned to a more quality-centered position.
The GDPR requires “privacy by design”.
Privacy relies on securing your information. If your information can be seen outside your trusted circle, it is no longer private! Security is essential for privacy. Yet, many of the technologies to transmit and store data have vulnerabilities, such as Wi-Fi and cloud storage (several examples of recent breaches show this is a problem that affects big and small companies alike).
When you store your valuables at home, you have a safe or a locked cupboard to protect your valuables. The same approach can be used to safeguard your most valuable information by locking it away encrypted on site before sending it over the Internet; software keys control access and allow a quick response to threats by removing access by revoking permissions. For added security the transport protocols used to transmit data can also be encrypted, as is the case with one Internet standard called XMPP (Extensible Messaging and Presence Protocol). Additionally you can take your data offline altogether.
Stuart will introduce us to the concept of “Edge” computing; storing and optionally processing data on site and enabling secure peer to peer transactions through a standards based broker managing the key exchange.
When should this architecture be used and what use cases does it solve?
Originally from the UK Stuart has worked internationally in software/hardware research and development since the 1980’s. Some of the companies Stuart has worked with include, ASML, BAe, Ericsson, IKEA, Intel, Nokia, Sagantec. Projects ranged from Aerospace and Semiconductors to Telecoms and Networks. Stuart holds a patent with Nokia Networks. His most unusual project was starting the Commercial Centre/Technology Park in Letńany, Prague, Czech Republic. He led a Czech deputation to Paris and Nice to get some inspiration, and now 25 years later it is the biggest commercial center in the Czech republic, with its own Metro station. Currently works at private social network start-up called Lilsis AB, developping Little Sister®.
17.00 Doors open, light food and beverages are served.
18.00 First talk with Innovate Security
19.00 Second talk with Lilsis AB
20.00 Wrap up
(Agenda may be subject to changes)