The Strategic Approach to Cloud Computing. From Tactics and Chaos to Efficiency
- LANGUAGE: English DATE: Thursday, November 08, 2012 TIME: 4:00pm CET, 10:00am EST
Selecting your Cloud Service Provider right and making sure that he steadily delivers on his promise - this needs processes in place at your organization enabling a structured way of selecting an appropriate cloud service from a myriade of offerings availabe in the market, and laying the foundations for effective and efficient cloud audits. Join this webinar to learn how to create such processes and reduce risks of high migration efforts, unnecessary costs or even unavailability of critical services.
Can an organization trust an IT service provided through the Cloud? A recent survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.”
Cloud services are outside the direct control of the customer organization, and their use places control of the IT service and infrastructure in the hands of the CSP (Cloud Service Provider). This fits with the KuppingerCole IT Paradigm for IT Governance. A governance based approach allows trust in the CSP to be assured through a combination of internal processes, standards and independent assessments.
The processes related to the selection of a cloud service therefore are critical for the overall success of your cloud strategy, and to fully reach the promised cost reduction effects of cloud computing in not wasting money for bad service quality and unnecessary migrations
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will give a short overview over the KuppingerCole IT Paradigm, and then describe how to create and implement cloud service request processes and the classification processes for data and applications.
Continuing Education Credits
After attending this webinar you will be able to:
- Understand the need to implement cloud provider selection processes.
- Describe those key internal processes for service requests and classification of data and
- Understand what is covered by independent certification and auditing of cloud service providers.
This event qualifies for 1 Group Internet Based CPE
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.