Information Security in the Cloud
Facebook Twitter LinkedIn

Information Security in the Cloud

Workshop
Friday, May 13, 2011 09:00—12:00
Location: Bodensee II

  1. An overview of Risk in the Cloud (Mike)
  2. An overview of the RiskIT process that the participants should follow (Vernon)
  3. The Workshop – the participants will be given a worksheet (a PPT with tables based on the example)
    • Scenarios – the participants choose a Scenario
    • Identify Assets at Risk – example based on ENISA study. The participants review the assets and make changes to their worksheet. Then there is a discussion.
    • Identify Risks - example based on ENISA study. The participants review the Risks and make changes to their worksheet. Then there is a discussion.
    • Identify Risk Responses - example based on ENISA study. The participants review the Responses and make changes to their worksheet. Then there is a discussion.
  4. Summary

Information Security in the Cloud
Presentation deck
Information Security in the Cloud
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Vernon Poole
Vernon Poole
Sapphire
Vernon is Head of Business Consultancy, responsible for Sapphire’s team of consultants who deal with Information Assurance/Governance and all best practice standards on Information Security...
Mike Small
Mike Small
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...
Subscribe for updates
Please provide your email address