...
13.05.2011 09:00-12:00

European Identity Conference 2011
Workshop

Information Security in the Cloud

  1. An overview of Risk in the Cloud (Mike)
  2. An overview of the RiskIT process that the participants should follow (Vernon)
  3. The Workshop – the participants will be given a worksheet (a PPT with tables based on the example)
    • Scenarios – the participants choose a Scenario
    • Identify Assets at Risk – example based on ENISA study. The participants review the assets and make changes to their worksheet. Then there is a discussion.
    • Identify Risks – example based on ENISA study. The participants review the Risks and make changes to their worksheet. Then there is a discussion.
    • Identify Risk Responses – example based on ENISA study. The participants review the Responses and make changes to their worksheet. Then there is a discussion.
  4. Summary
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.