Home | Community | News & Industry Events | European Identity and Cloud Conference

European Identity and Cloud Conference

May 19 – 22, 2026

NextLabs is pleased to be participating in the European Identity and Cloud Conference (EIC) 2026, taking place May 19–22, 2026, at the bcc Berlin Congress Center.

EIC 2026 is Europe’s leading conference for Digital Identity, Security, Privacy, and Governance — a space where technology meets trust and where thought leaders, innovators, and practitioners shape the digital future.

This year’s theme, “Digital Trust Through Intelligent Identity,” brings together the most pressing topics in the field, including:

  • Strategic Identity Governance: Control, Agility & Sovereignty in a Cloud-Driven World
  • Achieving Digital Trust: From Third-Party Access Governance to B2B Identity
  • Trust Frameworks at Scale: Building Bridges Across Borders
  • Privacy and Data Protection: Guardrails for Digital Identity
  • Zero Trust Identity & Modern Authorization Approaches
  • Quantum-Safe Identity: Readiness & Risk Management
  • Identity-Centric Security, Fraud Prevention & ITDR
  • Decentralized Identity, CIAM, and Non-Human Identity Governance
  • Trustworthy AI in Identity Systems
  • Misinformation, Disinformation & Trust
  • Identity for Industry 4.0 and Inclusivity in Identity

EIC 2026 promises an exceptional lineup of keynotes, expert sessions, and networking opportunities — designed to help you gain insights, connect with peers, and explore what’s next in digital identity and trust.

Data-Centric Security Bootcamp

The Data-Centric Security Bootcamp is a hands-on workshop focused on strengthening data security using zero trust principles.

Held on the first day of the European Identity and Cloud Conference, it provides practical guidance on securing data, enforcing access controls and policies, and mitigating risk in enterprise environments.

Led by NextLabs experts, the sessions cover policy enforcement and dynamic authorization for effective zero-trust data security.

Seats are limited. Early registration recommended.

NextLabs Participation in EIC 2026

Date: May 19 – 22, 2026

Location: bcc Berlin Congress Center, Berlin, Germany

Booth: 6

NextLabs is excited to be part of EIC 2026. Connect with our team to explore how Zero Trust Data-Centric Security can help your organization protect sensitive data, enforce least-privilege access, and maintain strong governance across hybrid and cloud environments.

Meet with Us

Visit us at booth 6 or fill out the form below to schedule a personalized session with NextLabs experts.

Combined Panel

This panel explores how organizations leverage behavioral, device, and contextual risk signals to drive adaptive access decisions. Speakers discuss delegation approaches and distributed governance models that enable scalable, secure decision-making. Attendees will gain practical insights into design patterns and governance choices that underpin effective adaptive access implementations.

NextLabs Panelist

Keng Lim is the founder and CEO of NextLabs – a leading provider of policy-driven information risk mitigation software for large enterprises. He founded NextLabs to tackle new complex information risk and data protection problems faced by large enterprises to compete in the global digital economic environment. Keng is a serial entrepreneur who has launched and built several software companies including Kiva Software, Netscape, Escalate, and Sygate over the last 20 years. He has been recognized as one of the industry’s “most influential people on the Internet” for the creation and advancement of the Application Server product and his contribution in the Web, SaaS, and information security software arena. Keng is a holder of over 100 approved and pending patents in the internet, Zero Trust, and data security related areas.

Customer Case Study

EIC - Deutsche Telekom Customer Session

Deutsche Telekom, a global leader in digital access, shares how it consolidated its IT infrastructure under a Zero Trust Architecture to continuously protect sensitive information. By implementing NextLabs’ Zero Trust Data Security, Deutsche Telekom unified its data protection processes across all major platforms for extensive user bases.

This approach enabled Deutsche Telekom to:

  • Automate and standardize security measures while adopting a global ERP strategy with strict data access controls.
  • Enhance cloud computing capabilities and protect against unauthorized access and data leakage.
  • Reduce operational costs through a no-code approach while maintaining continuous protection of sensitive data.
  • Implement field-level encryption, enforce privacy policies, and strengthen data governance across the organization.

Takeaways:

  • Automate access and protection of data using the least privilege principle and classification to dynamically protect sensitive information wherever it is used or stored.
  • Simplify management of data protection policies to prevent unauthorized access to restricted data.
  • Streamline policy administration through a unified platform to respond to new cybersecurity requirements in real-time.

Explore Zero Trust Data-Centric Security

As data spreads across cloud, on-premises, and mobile environments, protecting it requires more than traditional perimeter-based approaches. At the event, we will explore Zero Trust Data-Centric Security, a modern approach that places data at the center of security while enabling seamless access for authorized users, internal or external.

Key Aspects

  • Dynamic policy enforcement: Apply data security policies in real time at the moment of access, ensuring continuous protection across all environments.
  • Comprehensive coverage: Protect data at rest, in transit, and in use – across applications, databases, and structured or unstructured data stores.
  • Zero trust principles: Every access request is verified and granted on a least-privilege, need-to-know basis, whether inside or outside the corporate network.
  • Seamless collaboration: Maintain consistent security policies even when sharing data with partners or external stakeholders.

Learn about approaches and strategies for implementing Zero-Trust Data-Centric Security to safeguard enterprise data wherever it resides, without compromising accessibility or business agility.

  • CloudAz

    Unified policy management platform with Dynamic Authorization Policy Engine.

  • SkyDRM

    Persistent protection of critical files and documents stored and shared anywhere.

  • Application Enforcer

    Secure applications, externalize entitlement, protect data, and simplify access management.

Conference Resources

Data Access Enforcer (DAE) for Siemens Teamcenter

Learn how DAE for Siemens Teamcenter prevents unauthorized access to sensitive data stored in Siemens Teamcenter through fine-grained data-level security…

Secure Collaboration for Product Lifecycle Management (PLM)

Organizations find themselves grappling with the increasing complexity of multiple, overlapping dimensions of information risk that expand beyond the subject…

Intellectual Property Protection

Prevent intellectual property misuse and improper disclosure with a single policy set to manage controls inside and outside the enterprise, for enabling safe…

Safeguard AI with Zero Trust Architecture and Data-Centric Security

The consequences of not safeguarding AI systems are profound and farreaching- in sectors like healthcare and autonomous transportation, a breach in an AI system…

Managing Global Data Access in the Cloud

Explore how large-scale enterprises manage global data access in complex cloud environments to achieve security and compliance. We will address the challenges,…

Secure Engineering Collaboration

Intellectual property (IP) such as engineering designs, research documents, source code, parts specifications, engineering bill of materials (eBOM), and CAD…

Proactive Protection with Zero Trust Data-Centric Security

Implement a unified policy management system to protect data no matter where it resides.

secure together on the road - NextLabs

NextLabs Zero Trust Data Security Brochures

Explore more about  NextLabs solutions CloudAz, SkyDRM, Application Enforcer, and Data Access Enforcer

logo - Siemens

Zero Trust Data Security for Siemens Ecosystems

Learn how NextLabs Zero Trust Data Security is helping enterprises safeguard their Siemens ecosystems

logo NextLabs black no trademark

Welcome to the NextLabs Community 

NextLabs Community Members get unlimited access to the newest white papers, customer stories, etc. on the Community Portal as well as newsletters, product updates, and other exclusive news to your inbox.

Want to Join?

Login or register for a NextLabs ID to unlock the benefits of the Community Portal.