Home | Community | News & Industry Events | European Identity and Cloud Conference | Data-Centric Security Bootcamp

Data-Centric Security Bootcamp

Tuesday, May 19, 2026 | bcc Berlin Congress Center, Berlin, Germany

About the Bootcamp

The Data-Centric Security Bootcamp is a hands-on event designed to strengthen data security practices and safeguard critical enterprise systems through zero trust, data-centric security principles. Taking place on the first day of the European Identity and Cloud Conference, the bootcamp provides practical guidance on protecting critical data, securing user access, enforcing security policies, and mitigating risks in modern enterprise environments.

Led by experts from NextLabs, the sessions cover policy enforcement, access controls, and dynamic authorization, enabling the implementation of effective zero-trust data security measures across enterprise systems.

Register for the Data-Centric Security Bootcamp

Date: Tuesday, May 19, 2026

Location: bcc Berlin Congress Center, Berlin, Germany

Seats are limited. Early registration is recommended.

Explore Zero Trust Data-Centric Security

As data spreads across cloud, on-premises, and mobile environments, protecting it requires more than traditional perimeter-based approaches. At the event, we will explore Zero Trust Data-Centric Security, a modern approach that places data at the center of security while enabling seamless access for authorized users, internal or external.

Key Aspects

  • Dynamic policy enforcement: Apply data security policies in real time at the moment of access, ensuring continuous protection across all environments.
  • Comprehensive coverage: Protect data at rest, in transit, and in use – across applications, databases, and structured or unstructured data stores.
  • Zero trust principles: Every access request is verified and granted on a least-privilege, need-to-know basis, whether inside or outside the corporate network.
  • Seamless collaboration: Maintain consistent security policies even when sharing data with partners or external stakeholders.

Learn about approaches and strategies for implementing Zero-Trust Data-Centric Security to safeguard enterprise data wherever it resides, without compromising accessibility or business agility.

  • CloudAz

    Unified policy management platform with Dynamic Authorization Policy Engine.

  • SkyDRM

    Persistent protection of critical files and documents stored and shared anywhere.

  • Application Enforcer

    Secure applications, externalize entitlement, protect data, and simplify access management.

Related Resources

Check out some of NextLabs’ resources for zero trust data-centric security. For more resources from NextLabs, our partners, and subject-matter experts, check out our Community. 

Why Zero Trust Data-Centric Security is a Better Approach to Protecting Data

In an era where data breaches and cyber threats are more sophisticated and prevalent than ever, traditional perimeter-based security measures are proving…

Prevent Data Loss Across the ERP Landscape
Written by Deloitte & NextLabs

Explore in this collaborative white paper with Deloitte methods used to prevent data loss within ERP systems. Additionally, learn about how too overcome…

Safeguard AI with Zero Trust Architecture and Data-Centric Security

The consequences of not safeguarding AI systems are profound and farreaching- in sectors like healthcare and autonomous transportation, a breach in an AI system…

Proactive Protection with Zero Trust Data-Centric Security

Implement a unified policy management system to protect data no matter where it resides.

Managing Global Data Access in the Cloud

Explore how large-scale enterprises manage global data access in complex cloud environments to achieve security and compliance. We will address the challenges,…

Intellectual Property Protection

Prevent intellectual property misuse and improper disclosure with a single policy set to manage controls inside and outside the enterprise, for enabling safe…

Secure Collaboration for Product Lifecycle Management (PLM)

Organizations find themselves grappling with the increasing complexity of multiple, overlapping dimensions of information risk that expand beyond the subject…

Ensuring Data Security, Confidentiality, and Privacy for ERP Transformations

Fluctuating economic times have heightened the digital agenda for many organizations as they pivot to adjust to new market realities. Modernizing one’s ERP…

secure together on the road - NextLabs

NextLabs Zero Trust Data Security Brochures

Explore more about  NextLabs solutions CloudAz, SkyDRM, Application Enforcer, and Data Access Enforcer

logo NextLabs black no trademark

Welcome to the NextLabs Community 

NextLabs Community Members get unlimited access to the newest white papers, customer stories, etc. on the Community Portal as well as newsletters, product updates, and other exclusive news to your inbox.

Want to Join?

Login or register for a NextLabs ID to unlock the benefits of the Community Portal.