• Graduation

    Certificate of attendance

  • Learning format

    Blended Learning

  • Duration

    1 day

  • Start

    30 October 2024

  • Costs

    EUR 990,--

  • Language

    German

  • Study location

    Krems (AT)

Cloud computing is a much-discussed topic in the business environment, as it provides a modern approach to solving decades-old challenges. In order to take advantage of the benefits associated with cloud services, many companies and providers in the area of critical infrastructures and public institutions are also increasingly relying on these technologies. The use of cloud computing offers many opportunities, but these must be considered in light of the risks and aspects of information security. A significant difference to the operation of conventional on-premises solutions is that the characteristics of cloud computing lead to other risks and dangers when using this technology. Furthermore, technical complexity and certain areas of responsibility are outsourced.
In addition to the management and processes within a cloud governance & security program, companies need a different understanding of how to ensure adequate protective measures (especially in relation to on-premises infrastructures). Furthermore, technical skills and systems are needed to implement the security requirements for cloud systems efficiently and effectively.
Markus Hartleitner

The use of cloud computing can improve service quality while maintaining the same level of resources. However, information security must not be neglected here.

Markus Hartleitner

Lecturer

You are welcome to find detailed information about the program on the German website, as the language of instruction for this program is German, or you can contact us directly.

Do you have any questions?

We will be happy to advise you.

Or contact us directly.

The training is aimed at employees in companies and public institutions who want to introduce, operate or further develop cloud services and cloud security or who are entrusted with the management and control of cloud security (incl. GRC) as part of an ISMS. In addition, information security officers, IT security officers, IT administrators, IT managers, IT directors, information security officers (ISOs), data protection and quality management officers, consultants in the field of information security as well as risk and compliance managers are addressed. A general knowledge of information technology and security is required.
 

  • small class sizes

  • practice-oriented

  • future skills

Back to top