1. Information Security Risk ManagementIT operation outsourcingA case study 2. Based on a real project Identities protected and altered – does notaffect the process…