...
04.05.2010 09:00-13:00

European Identity Conference 2010
Pre-conference Meeting

Cloud Computing – Answers to 10 Security Questions you Should Ask

Cloud computing is a hot topic, but how does an organization using a Cloud service for business critical systems make sure that their information is secure? This pre-Conference workshop outlines the risks involved in Cloud Computing and provides answers to ten information security questions you should ask before starting a cloud computing initiative.

Mike Small, Senior Information Security Advisor and Fellow Analyst at Kuppinger Cole, and Kuppinger Cole´s security expert Prof. Dr. Sachar Paulus, will lead you through these questions:

  1. HOW IS IDENTITY AND ACCESS MANAGED IN THE CLOUD?
  2. WHERE WILL MY DATA BE LOCATED?
  3. HOW SECURELY IS MY DATA HANDLED?
  4. HOW IS ACCESS BY PRIVILEGED USERS CONTROLLED?
  5. HOW IS MY DATA PROTECTED AGAINST PRIVILEGED USER ABUSE?
  6. WHAT LEVELS OF ISOLATION ARE SUPPORTED?
  7. HOW IS MY DATA PROTECTED IN VIRTUAL ENVIRONMENTS?
  8. HOW ARE THE SYSTEMS PROTECTED AGAINST INTERNET THREATS?
  9. HOW ARE ACTIVITIES MONITORED AND LOGGED?
  10. WHAT KIND OF INFORMATION SECURITY CERTIFICATION DO YOU HAVE?

 

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.