Explore cloud security considerations unique to the government and military, including data protection, privacy, risk, and compliance requirements around the world.
Overview
Syllabus
Introduction
- Protect government and military data
- What you should know
- Security considerations for the government and military industries
- Key cloud computing drivers
- Cloud computing characteristics
- Deployment models
- Service models
- IT implementation options
- Infrastructure attack vectors
- Software attack vectors
- Critical vulnerabilities
- Examine security requirements
- Cyber threats to government
- CISO expectations in government
- Geographic impact
- Data protection and privacy requirements
- Data and privacy in Australia
- Data and privacy in China
- Data and privacy in Japan
- Data and privacy in India
- Data and privacy in Russia
- Data and privacy in Switzerland
- Data and privacy in Germany
- Data and privacy in the UK
- Data and privacy in Brazil
- Data and privacy in the United States
- Data and privacy in the Middle East and Africa
- Examine risk and compliance requirements
- Risk and compliance requirements in Oceania
- Risk and compliance requirements in Europe
- Risk and compliance requirements in the Americas
- Treacherous 12
- Government relevant case study #2
- Government relevant case study #1
- Next steps
Taught by
Kevin L. Jackson