Home‎ > ‎

Cloud Computing Risk Mitigation Via Contract Negotiation and Vendor Management - Seminar Description

Overview

If you don’t think your organization is using cloud computing services, think again.  The ease with which cloud computing can be adopted means that end users can sign up for a cloud service without going through traditional channels, such as IT or purchasing.  The acquisition of cloud computing services presents a paradigm shift from traditional IT procurement, and brings with it a unique set of risks.  Client organizations need to be aware of these risks and be prepared to effectively address them prior to acquiring the service.  A client must identify, analyze and mitigate these issues relative to their unique needs and tolerance for risk in each specific use case.  Unprepared organizations expose themselves to a wide range of risks related to data security, compliance, service availability, and vendor lock-in.
 
 
What You'll Learn
Seminar participants will leave this seminar with a thorough understanding of what cloud computing is, it's unique nature, benefits and challenges, the paradigm shift that cloud computing represents, and an organized framework and checklist by which to mitigate cloud computing risks related to infrastructure and security, service level agreements, data location, access and protection, and vendor relationships.  After attending this seminar, participants will be fully equipped and prepared to help their organizations effectively mitigate these risks and maximize the benefits of cloud computing deployments.  Each participant will receive their own copy of the Cloud Computing Contract Checklist (C4), a proven tool for mitigating cloud computing risk mitigation via contract negotiation and vendor management. 
 
 
Who Should Attend
This course is the must attend learning event for anyone implementing, planning, or considering adopting a cloud computing solution, including professional in the following disciplines:
  • Vendor Management
  • Procurement/Sourcing
  • Contract Management
  • IT - Technical
  • IT - Security/Policy
  • Legal Affairs
  • Risk Management
  • Privacy Officers
  • Audit/Compliance/Governance
  • Business Managers

 

Course Outline
  • The Unique Nature of Cloud Computing
    • Characteristics
    • Services models
    • Deployment models
    • Benefits
  • The Paradigm Shift of Cloud Computing
  • Cloud Risk Mitigation Framework 
      • Infrastructure and Security
        • Information security
        • Physical security
        • Operations management
      • Service Level Agreements (SLA)
        • SLA parameters
        • SLA metrics
        • SLA remedies
      • Data Protection, Access and Location
        • Data ownership
        • Data access and disposition
        • Data breaches
        • Data location
      • Vendor Relationship
        • Costs to continue use
        • Termination
        • Mergers and acquisitions
        • Vendor outsourcing
     
    Course Format
    The course length is one day and runs from 9:00 am to 5:00 p.m.
     
     
    Materials and Class Size
    All course materials are provided. Space is limited to 30 people. If the minimum number of registrations is not attained we may cancel or defer this class. We are not responsible for travel-related expenses incurred in the event of a change.
     
     
     

    Comments