Risk Management & Outsourcing Design

Cloud    |    Expert
  • 10 videos | 48m 40s
  • Includes Assessment
  • Earns a Badge
Likes 37 Likes 37
Cloud service providers are compelled to protect the privacy, integrity, and confidentiality of client assets. Examine enterprise risk management, outsourcing and contract design, and vendor management to provide legal compliance assurance.

WHAT YOU WILL LEARN

  • describe issues with obtaining details of a CSP's risk management data
    describe issues surrounding the importance of data ownership and define interrelationships between owner and custodian regarding responsibility
    outline measures to mitigate risk
    outline the integration of information security and risk management activities into a formal framework
    outline the metrics that quantify and measure the extent of a risk associated with cloud service elements and components
  • define key areas of focus for risk assessment, including supplier, vendors, services, etc.
    describe business requirements with reference to the Service Level Agreement, GAAP guidelines, and standards
    describe the vendor and provider vetting process with reference to certifications, audit and event reporting, accreditations, etc.
    describe the deployment of supply-chain management in the context of cloud services
    detail current legislation relating to PII and define a number of widely adopted auditing compliance frameworks and report types. Outline available auditing standards and frameworks, describe ISMS and applicable standards and guidance, and detail a number of cloud service adoption risks. Finally, outline some detail on available cloud service-related risk management frameworks.

IN THIS COURSE

  • 4m 36s
    Upon completion of this video, you will be able to describe issues with obtaining details of a CSP's risk management plan. FREE ACCESS
  • 5m 42s
    After completing this video, you will be able to describe issues surrounding the importance of data ownership and define interrelationships between owners and custodians regarding responsibility. FREE ACCESS
  • Locked
    3.  Risk Management
    5m 44s
    In this video, you will outline measures to reduce risk. FREE ACCESS
  • Locked
    4.  Risk Frameworks
    5m 23s
    In this video, you will outline the integration of information security and risk management activities into a formal framework. FREE ACCESS
  • Locked
    5.  Risk Management Metrics
    4m 24s
    In this video, learn how to outline metrics that quantify and measure the extent of a risk associated with cloud service elements and components. FREE ACCESS
  • Locked
    6.  Cloud - Risk Assessment
    6m 55s
    During this video, you will learn how to define key areas of focus for risk assessment, including suppliers, vendors, services, etc. FREE ACCESS
  • Locked
    7.  Business Requirements
    3m 43s
    Upon completion of this video, you will be able to describe business requirements with reference to the Service Level Agreement, GAAP guidelines, and standards. FREE ACCESS
  • Locked
    8.  Contract and Vendor Management and Assessment
    4m 20s
    After completing this video, you will be able to describe the vendor and provider vetting process with reference to certifications, audits, event reporting, and accreditations. FREE ACCESS
  • Locked
    9.  Supply-chain Management
    4m 45s
    After completing this video, you will be able to describe the deployment of cloud services in the context of supply-chain management. FREE ACCESS
  • Locked
    10.  Legal and Compliance Assurance
    3m 10s
    During this video, you will learn how to detail current legislation relating to PII and define a number of widely adopted auditing compliance frameworks and report types. Outline available auditing standards and frameworks, describe ISMS and applicable standards and guidance, and detail a number of cloud service adoption risks. Finally, outline some detail on available cloud service-related risk management frameworks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 70 Likes 70  
Likes 1445 Likes 1445