Introduction
  • Motivation: IT Security Holes in Projects and Products
  • Enforce IT Security in Projects
Content
  • IT Security in Projects: From the very beginning!
  • Security is a Process
  • IT Security Standards
  • Data Privacy / Protection Laws
  • Checklist for Project Managers
Conclusion
  • Course Assessment
  • Conclusion