Information Security Governance and Cloud Computing

Good Essays
A WALK THROUGH THE STANDARDS THAT APPLY IN IT: FROM INFORMATION SECURITY TO GOVERNANCE AND CLOUD COMPUTING
ISACA APPROVED 6 CPEs Offered

TÜV AUSTRIA ACADEMY

TIRANE PRO-TIK Innovation Center close to AKSHI, Rruga, Papa Gjion Pali II, Nr 3, Tirane

SEMINAR at

22 / 01 / 2013 Cost: 290€ per participant

40% discount for all TÜV AUSTRIA Hellas clients 20% discount for all TÜV clients that have already accepted our quotations but audit has not yet finished
ABOUT THIS COURSE
Are ISO (International Standardization Organization) and 27001 unknown words and just plain numbers? Is IT Service Management just a fancy way of saying nothing at all? Is BS 25999 something people should know about? Who is playing with the numbers 25999, 25777, 7799, 27799? Do you want to know what the name TUV, APMG, ITSMF, ISACA, ISEB, HISP and CSA stand for? Join this training course to get a firm understanding on the standards, the organizations and the principlas that lie behind these numbers and names. There are no prerequisites for the participation.

CONTENT
This training course is in fact a walk through the IT domain. The different areas that will be covered include: • IT Service Management • Information Security • IT Governance • Information Security Risk Management • Business Continuity • Disaster Recovery • Green IT • Cloud Computing

Tutor: Mrs ARGYRO CHATZOPOULOU, M.Sc., TÜV AUSTRIA HELLAS IT Manager, ISMS, QMS, BCMS and ITSMS Lead Auditor, recognized IRCA Tutor, with more than 400 hours of training in relevant courses. Ms Chatzopoulou also holds the following qualifications : CISA, HISP, ISEB BCMP, CCSK

WHAT YOU WILL LEARN
After the completion of this training course you will be acquainted with the most important standards that can be enforced in the IT industry. You will know the differences between the standards ISO 27001 and ISO 20000. You will be able to describe the difference in meaning between IT Service Management System and ITIL. You will gain

You May Also Find These Documents Helpful

  • Powerful Essays

    Towards Trusted Cloud Computing Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues MPI-SWS Abstract Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. However, clients of cloud computing services currently have no means of verifying the confidentiality and integrity of their data and computation. To address this problem we propose the design of a trusted cloud computing platform (TCCP). TCCP enables Infrastructure as a Service (IaaS) providers…

    • 4011 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    TCOM 5223 Security Risks in Cloud Computing Security Risks in Cloud Computing Security Risks in Cloud Computing Abstract 2 Introduction 3 What is Cloud Computing? 3 Personal Use of Cloud 4 Company Use of Cloud 4 Advantages of Cloud Computing 5 Advantages of Cloud Computing for Individuals 6 Advantages of Cloud Computing for Companies 7 Security Risks of Cloud Computing 8 Security Risks of Individual 9 Security Risks for Companies 12 Location of Cloud Computing…

    • 5810 Words
    • 24 Pages
    Powerful Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public. Public cloud services may be free or not. In public clouds which they are running applications externally by large service providers and offers some benefits over private clouds. Private Cloud…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Suman M R VEDAVYASA INSTITUTE OF TECHNOLOGY CLOUD SECURITY ISSUES AND MECHANISM CHAPTER 1, 1.INTRODUCTION Cloud computing is the delivSuman M R VEDAVYASA INSTITUTE OF TECHNOLOGY CLOUD SECURITY ISSUES AND MECHANISM CHAPTER 1, 1.INTRODUCTION Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid)…

    • 13362 Words
    • 54 Pages
    Powerful Essays
  • Powerful Essays

    SECURITY IMPLICATIONS OF CLOUD COMPUTING Narendran Calluru Rajasekar November 30th, 2009 Supervised by Dr Chris Imafidon (formerly Queen Mary University of London) MSC Internet Systems Engineering University of East London, Docklands. Acknowledgements Anne-Marie Imafidon University of Oxford. Table of Contents 1 Abstract 2 Cloud Computing 2.1 Definition 2.2 Understanding Cloud Computing 3 Security Implications 3.1 Security Components…

    • 3242 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The Security of Cloud Computing System enabled by Trusted Computing Technology Zhidong Shen International School of Software, Wuhan University, Wuhan, China, 430079 zhidongshen@163.com Qiang Tong School of Software, Northeastern University, Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network…

    • 3993 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Enhancement The Security in Cloud Computing A short term proposal submitted for the registration of Ph.D. in Computer Science. Researcher Guide Swami Ramanand Teerth Marathwada University Nanded, Mahrrashtra, India INTRODUCTION Cloud computing provides a new computing paradigm that delivers IT as a service. The objectives of the new computing paradigm are to increase capacity and capabilities at runtime without investing…

    • 1016 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Security Risks in Cloud Computing University Writing Essentials / ENG 147 Security Risks in Cloud Computing With technology as advanced as it is today, most find that security in Cloud computing is more secure and better when in fact the risks are higher than ever before. What could be presumed safe, could in fact present a major vulnerability in the eyes of a hacker. When accessing the Cloud, users depend on the security, which in turn subjects them to security risks in privacy, security, and data…

    • 924 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cloud Computing is a process of delivering a companies or individual’s applications and documents from any place, at any time, on any device. It is also a process in which hosted services are delivered through the internet. Cloud computing helps in bringing together complex IT documents in a small number of places, which can be managed easily. Although cloud computing has its advantages such as simplicity and cost, there are certain security concerns which have been brought about by users, as it…

    • 2014 Words
    • 9 Pages
    Best Essays
  • Best Essays

    Analysing Various Security Aspects of Web and Mobile Cloud Computing Abstract In this paper, we have discussed security issues for web and mobile cloud computing. Cloud computing provides Internet-based services, computing, and storage for users in all markets including financial, healthcare, and government. This new approach to computing allows users to avoid upfront hardware and software investments, gain flexibility, collaborate with others, and take advantage of the sophisticated…

    • 2039 Words
    • 9 Pages
    Best Essays