Home | Community | News & Industry Events | European Identity and Cloud Conference
European Identity and Cloud Conference
May 19 – 22, 2026
Home | Community | News & Industry Events | European Identity and Cloud Conference
May 19 – 22, 2026
NextLabs is pleased to be participating in the European Identity and Cloud Conference (EIC) 2026, taking place May 19–22, 2026, at the bcc Berlin Congress Center.
EIC 2026 is Europe’s leading conference for Digital Identity, Security, Privacy, and Governance — a space where technology meets trust and where thought leaders, innovators, and practitioners shape the digital future.
This year’s theme, “Digital Trust Through Intelligent Identity,” brings together the most pressing topics in the field, including:
EIC 2026 promises an exceptional lineup of keynotes, expert sessions, and networking opportunities — designed to help you gain insights, connect with peers, and explore what’s next in digital identity and trust.
The Data-Centric Security Bootcamp is a hands-on workshop focused on strengthening data security using zero trust principles.
Held on the first day of the European Identity and Cloud Conference, it provides practical guidance on securing data, enforcing access controls and policies, and mitigating risk in enterprise environments.
Led by NextLabs experts, the sessions cover policy enforcement and dynamic authorization for effective zero-trust data security.
Seats are limited. Early registration recommended.
Date: May 19 – 22, 2026
Location: bcc Berlin Congress Center, Berlin, Germany
Booth: 6
NextLabs is excited to be part of EIC 2026. Connect with our team to explore how Zero Trust Data-Centric Security can help your organization protect sensitive data, enforce least-privilege access, and maintain strong governance across hybrid and cloud environments.
Visit us at booth 6 or fill out the form below to schedule a personalized session with NextLabs experts.
This panel explores how organizations leverage behavioral, device, and contextual risk signals to drive adaptive access decisions. Speakers discuss delegation approaches and distributed governance models that enable scalable, secure decision-making. Attendees will gain practical insights into design patterns and governance choices that underpin effective adaptive access implementations.
NextLabs Panelist
Keng Lim is the founder and CEO of NextLabs – a leading provider of policy-driven information risk mitigation software for large enterprises. He founded NextLabs to tackle new complex information risk and data protection problems faced by large enterprises to compete in the global digital economic environment. Keng is a serial entrepreneur who has launched and built several software companies including Kiva Software, Netscape, Escalate, and Sygate over the last 20 years. He has been recognized as one of the industry’s “most influential people on the Internet” for the creation and advancement of the Application Server product and his contribution in the Web, SaaS, and information security software arena. Keng is a holder of over 100 approved and pending patents in the internet, Zero Trust, and data security related areas.
Deutsche Telekom, being at the forefront of providing global digital access, sought to consolidate their IT infrastructure under the Zero Trust Architecture to continuously protect sensitive information. To address these challenges, Deutsche Telekom implemented NextLabs’ Zero Trust Data Security to unify data protection process for extensive user bases across all major platforms. Deutsche Telekom was able to adopt the zero-trust security architecture to automate and standardize security measures and implement a global ERP strategy with strict data access controls. Additionally, it enabled the Company to enhance cloud computing capabilities and ensures effective security measures by protecting against unauthorized access and data leakage, all while reducing costs with a no-code approach. These measures allow Deutsche Telekom to continuously protect sensitive data, implement field-level encryption, and enforce privacy policies, thereby strengthening data governance and standardizing data protection across the organization.
Takeaways:
Combined Panel
This panel examines how large enterprises can modernize complex, legacy authorization landscapes into clear, business-aligned role models. As entitlement sprawl grows and regulatory pressure increases, getting authorization right is essential for security, compliance and operational efficiency. Panelists will share data-driven techniques for analyzing entitlements, designing meaningful roles and embedding least privilege, segregation of duties and traceability. Attendees will learn practical methods to involve business stakeholders, run simulations and establish ownership, gaining actionable guidance for governing large-scale authorization models in regulated environments.
Featuring a Representative from Deutsche Telekom
Dennis Kaps is a senior IT security and governance expert with extensive experience in governance, security, and compliance.
He has held leading roles in shaping security strategies, defining governance frameworks, and steering complex initiatives in large enterprise environments.
With a strong background in IT governance and security management, Dennis combines deep expertise with a pragmatic, results‑oriented leadership approach.
Recognized as an Overall Leader in KuppingerCole Analysts’ Leadership Compass: CIEM report.
For the second consecutive KuppingerCole’s Leadership Compass, NextLabs is recognized as an overall leader in PBAM.
The Buyer’s Compass combines separate reports on Policy-Based Access Management (PBAM) and Cloud Infrastructure Entitlement Management (CIEM) into a single document, reflecting the integrated capabilities of NextLabs’ solution.
Keng Lim x Martin Kuppinger
Watch this discussion between Martin Kuppinger and Keng Lim to see how PBAM and CIEM enable real-time, policy-based authorization across applications, data, and identities—forming the foundation of Zero Trust.
Explore how organizations are applying Data-Centric Security to protect growing data and complex, AI-driven environments.
As data spreads across cloud, on-premises, and mobile environments, protecting it requires more than traditional perimeter-based approaches. At the event, we will explore Zero Trust Data-Centric Security, a modern approach that places data at the center of security while enabling seamless access for authorized users, internal or external.
Learn about approaches and strategies for implementing Zero-Trust Data-Centric Security to safeguard enterprise data wherever it resides, without compromising accessibility or business agility.
Unified policy management platform with Dynamic Authorization Policy Engine.
Persistent protection of critical files and documents stored and shared anywhere.
Secure applications, externalize entitlement, protect data, and simplify access management.
Zero Code approach to secure access and protect critical data independent of application.
Learn how DAE for Siemens Teamcenter prevents unauthorized access to sensitive data stored in Siemens Teamcenter through fine-grained data-level security…
Organizations find themselves grappling with the increasing complexity of multiple, overlapping dimensions of information risk that expand beyond the subject…
Prevent intellectual property misuse and improper disclosure with a single policy set to manage controls inside and outside the enterprise, for enabling safe…
The consequences of not safeguarding AI systems are profound and farreaching- in sectors like healthcare and autonomous transportation, a breach in an AI system…
Explore how large-scale enterprises manage global data access in complex cloud environments to achieve security and compliance. We will address the challenges,…
Intellectual property (IP) such as engineering designs, research documents, source code, parts specifications, engineering bill of materials (eBOM), and CAD…
Implement a unified policy management system to protect data no matter where it resides.
Explore more about NextLabs solutions CloudAz, SkyDRM, Application Enforcer, and Data Access Enforcer
Learn how NextLabs Zero Trust Data Security is helping enterprises safeguard their Siemens ecosystems
Welcome to the NextLabs Community
NextLabs Community Members get unlimited access to the newest white papers, customer stories, etc. on the Community Portal as well as newsletters, product updates, and other exclusive news to your inbox.
Login or register for a NextLabs ID to unlock the benefits of the Community Portal.