Course
Cloud Service Governance (for Manager) («CLSECU»)
Cloud services have become an essential part of the modern enterprise. This course explains what to consider and how to securely procure, manage, monitor, and operate cloud services.
Duration
1 day
Price
1'300.–
Course documents
Digicomp courseware (digital)
Course facts
- Specifying and implementing cloud security governance
- Developing the information security principles
- Embedding information security within management and the board of directors
- Integrating information security requirements into all processes
- Defining security requirements
- Developing a business case for information security
- Developing the ICT security architecture
- Ensuring the integration of information security aspects into business continuity management
- Ensuring data security during transmission
- Ensuring data security during storage and archiving
1. Half day
- Cloud services – Service models, architecture models and the cloud reference architecture
- Cloud services in a business context
- Cloud security governance – who bears what responsibility
- Cloud and the data lifecycle; legal and regulatory requirements regarding cloud security
- Security certifications and attestations in the cloud environment
2. Half day
- Cryptography and key management in clouds; Cloud Access Security Broker (CASB)
- Cloud services and business continuity, disaster recovery
- Risks of cloud services and the secure way into the cloud
- Cloud security operations, security incident management, security testing and forensics in cloud services
Component of the following courses
The topics relevant to customers and suppliers are explained and discussed on the basis of practical examples and questions from the participants' environment. The course includes group exercises and room for discussion.
This course is designed for Information Security Officers on their way to CISO, Chief Information Security Officers in small and medium sized companies as well as people with CxO functions with an interest or need in information security.
Experience as Security Officer or Information Security Officer and practical experience in IT security