Skip to main content

Data Center Security

thu08may17:0019:30Data Center Security

Event Details

Dear members of ASIS and SIG Security!

We are excited to announce this collaboration between our two associations.

Together we invite you to join an event on Data Center Security! Whether you are new to security related to data centers or looking to deepen your understanding, this session will give you valuable insights from our expert speakers.

Image
 
Date: Thursday May 8, 2025
Time: 17:00 – 19:30
Location: Online (registration required) 
Tickets: This event is free of charge for members of ASIS International and SIG Security.
Registration: Please register by May 6, 2025.
Credits: Attendance at this event is eligible for 2 CPE toward an ASIS certification. A certificate of attendance will be sent upon request.
Guests: You have the option to share the invite with a guest. The guest must register and provide the name of their host.

Description
Many companies and organizations have chosen to outsource parts or the entire operations of IT in third party datacenters. During this educational session our speakers will dive into some critical aspects of outsourcing IT related operations:

What can we learn from outsourcing IT operations from a security perspective?
Outsourcing IT operations can offer several security benefits, but it also comes with risks that need to be managed effectively related to Information Security to include protecting data from unauthorized access, breaches, and other cyber threats, Physical Security to protect hardware and infrastructure from theft, damage, or unauthorized access and Personnel Security to ensure that the personnel handling your outsourced operations are trustworthy and well-trained in security protocols.

What are the most valuable Lessons from Crises and Continuity Perspective (BCP/DRP)?Business Continuity Planning (BCP) includes identifying critical business processes, creating redundancies, and establishing procedures to ensure continuity and maintaining essential business functions during a crisis. and Disaster Recovery Planning (DRP) with a focus on recovering from disruptions and restoring normal operations. 

How do you Audit and Maintain a Contract with an Outsourced Operation?
Contracts must be Reviewed to ensure compliance with Service Level Agreements (SLAs) and monitoring performance metrics, uptime, response times, and security measures and Auditing to evaluate evaluating governance, disaster recovery processes, and compliance with security standards

Why is choosing an ISO 27000 Certified Partner important?
Choosing an ISO 27000 certified partner demonstrates commitment to information security management and the ISO 27000 comprehensive framework for managing information security risks, ensuring data protection, and enhancing trust among stakeholdersThere are risks associated with data processing whether outsourced or not. It is critical to maintain Information Security, Cybersecurity, Privacy and compliance with data privacy laws and regulations, such as GDPR and CCPA, as well as transparency with stakeholders. It’s essential to conduct thorough due diligence when selecting a vendor, include robust security requirements in contracts, and regularly audit and monitor the vendor’s security practices.
 

Register to the event!

Program
17:00-17:10  Welcome by Kristiina Mellin, Chapter Chair ASIS Sweden and Jaak Akker, Chair SIG Security 

17:10-17:40  Session with Mia Korhonen, CPP, Regional Security Operations Manager Nordics & UAE, Microsoft
“The role of physical security supporting secure cloud”

17:40-18:00 Break

18:00-18:30  Session with Pär Åberg, Chair of the Swedish Datacenter Industry association (SweDCI) and Business Executive at Atea Sweden AB
“Implementing NIS2: Challenges and Opportunities in Practice”

18:30-18:40 Break

18:40-19:10  Session with David Llewellyn, CPP, CISM, FSyl, Security Manager atNorth
“Challenges of building a risk based security program in the COLO DC industry, balanced against an ever complex threat environment and increasing EU regulation”

19:10-19:20 Panel with all speakers

19:20-19:30  Closing notes by Kristiina Mellin and Jaak Akker

Image
Mia Korhonen, CPP
Mia is the Regional Security Operations Manager, Microsoft. 
Currently managing the physical security operations at Microsoft data centers in Nordics and UAE. She is recognized for in-depth planning, executing and developing security operations, investigations, projects, policies and strategies at the managerial, strategic as well as at the operational level. 

Image
Pär Åberg
Business Area Manager, Atea Sweden AB / Chairman of the Board, Swedish Data Center Industry Association.
With over two decades of experience in the Nordic data center industry, Pär Åberg leads Atea Sweden’s offering within Hybrid Platforms. His focus is on security, cloud, AI, and modern IT infrastructure, helping customers navigate their digitalization journey with innovative and sustainable solutions. 

Image
David Llewellyn, CPP, CISM, FSyl
David is the global security manager at atNorth.
David has extensive experience from Crane Currency, a global currency manufacturer and security printer. He is a former manager at VISA Europe and KPMG. He is a highly qualified Subject Matter Expert on ISO standards and laws and regulations impacting security. ISO/IEC 27001 Senior Lead Auditor, CSMP from ISMI, Member (M. IRSM). 

Time

8 maj, 2025 17:00 - 19:30(GMT+02:00)

Location

Microsoft teams

Other Events

Microsoft teams