Shopping Cart | Training Portal | Contact Us | 1-800-473-5181

Examining the Risks of Cloud Computing

Cloud Computing Risks & Mitigation Based on Best Practices and NIST Publications for FISMA Compliance

IP3 has teamed up with FITSI DC to provide this exciting 2-day workshop. Interested in providing a similar session for your association? Contact us and we can custom design one to suit your organization or association.


Get 14 CPE Credits!

Course Overview

Organizations now more than ever are feeling pressure to reduce IT costs and optimize IT operations. Cloud computing is rapidly growing, as it is a viable, cost-effective way to create dynamic, rapidly provisioned resources for a number of areas; including: development environments, operating platforms, applications, storage, etc.

There are many security considerations that exist that compliance and information security professionals need to consider when evaluating the risks of cloud computing. During this 2-day session we will explore:

  1. Cloud Architecture – based on architecture and materials described in NIST SP 144, 145, and 146
  2. Cloud Threats, Vulnerabilities, and Exploits
  3. Reviewing the SSAE 16 Auditor’s Report
  4. Extending controls to the cloud                                `
  5. Access Control and Key Management in the Cloud as prescribed by NIST SP 144/146

What you will learn

  • Understand the benefits, risks and recommendations for Information Security in the Cloud and develop an information assurance framework that outlines vulnerabilities, liabilities and key legal issues.
  • Learn how to develop a cloud computing architectural framework and reference model
  • Understand Governance and Enterprise Risk Management in the Cloud
  • Identify legal issues and eDiscovery considerations
  • Analyze compliance and auditor requirements
  • Identify the phases of data security lifecycle and their key elements
  • Understand encryption methods and review practical encryption use cases and key management practices and standards
  • Summarize risk mitigation techniques
  • Review Data Center Operations in a cloud environment
  • Identify Incident Response, Notification, and Remediation
  • Understand response trade-offs in Application Security 

What you get

  • IP3 Workbook
  • CD containing the following:
  • CSA’s eBook  on Security Guidance for  Critical Areas of Focus in Cloud  computing V2.1
  • ENISA eBook  on Cloud Computing Security Risk Assessment
  • Relevant white papers on Cloud Computing
  • NIST SP800-144 Guidelines on Security and  Privacy in Public Cloud  Computing
  • NIST SP800-145 The NIST Definition of Cloud  Computing
  • NIST SP800-146 Cloud Computing Synopsis and Recommendations


Cloudy Skies *

Cloud Computing Risks & Mitigation Based on Best Practices and NIST Publications for FISMA Compliance

Security Blog

Does your smartphone app discover all your accounts?

There’s a chill in the air, and it’s not just the normal fall morning breeze. In the era of NSA Prism/Xkeyscore/whatnext surveillance, and...

Ethical implications of whistle blowing

(ISC)2 code of ethics; Protect society, the commonwealth, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Advance and protect...

The Great ATM Heist - is it really newsworthy?

On Friday, May 10, we saw many headlines about the latest great ATM bank robbery. Apparently these types of attacks are being regarded as...