Information Security in the Cloud
13.05.2011 09:00-12:00
European Identity Conference 2011
Workshop
Information Security in the Cloud
- An overview of Risk in the Cloud (Mike)
- An overview of the RiskIT process that the participants should follow (Vernon)
- The Workshop – the participants will be given a worksheet (a PPT with tables based on the example)
- Scenarios – the participants choose a Scenario
- Identify Assets at Risk – example based on ENISA study. The participants review the assets and make changes to their worksheet. Then there is a discussion.
- Identify Risks - example based on ENISA study. The participants review the Risks and make changes to their worksheet. Then there is a discussion.
- Identify Risk Responses - example based on ENISA study. The participants review the Responses and make changes to their worksheet. Then there is a discussion.
- Summary