Cloud Assurance & Cloud Risk Awareness in the Light of PRISM
- LANGUAGE: English DATE: Wednesday, July 03, 2013 TIME: 4:00pm CEST, 10:00am EDT, 2:00pm GMT
With the recent unveiling of systematic and large scale espionage activities conducted by US government agencies, the level of trust into cloud services run and controlled by 3rd parties has reached a new low. Google, Facebook, Skype, Apple, Verizon and many other service providers did open their databases to NSA and enabled them to search your mails and documents for information considered as valuable in whatever context. In this webinar, KuppingerCole´s Senior Analyst Mike Small will give you an introduction on how to identify the key assurance challenges of the different kinds of Cloud Computing and how to put into context the risk of becoming a victim of economic espionage through usage of KuppingerCole’s approach to selecting and assuring cloud services.
Continuing Education Credits
After attending this webinar you will be able to:
- Summarize the revelations around the US Prism Project
- Describe which cloud services and components are involved
- Explain why risk management is a key to managing cloud services
- Assess the risk of cloud services against their benefits
- Identify the key aspects of cloud services that need assurance.
This event qualifies for 1 Group Internet Based CPE
Prerequisites: None Advance Preparation: None Learning Level: Intermediate Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: firstname.lastname@example.org
Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.