This training session is part of the programme of the Digital Infrastructures for Research 2016 event.
In this training session we will mostly detach from our keyboards and deal with an security incident in a Role Play format. Here we will deal with a realistic simulation of a compromised Identity Provider and will look at various obstacles we come across on all levels (technical, managerial, public relations and legal) of the incident handling process.
Audience
Members/Future Members of Security/Admin Teams, Site/NGI/Project/Federation Management, Press-, Legal Contacts, Managers and security personnel of Research Infrastructures, User communities and Virtual Organisations.