Determine best practices for migrating existing servers (Physical to virtual Conversions); Investigate into any performance issues that might be encountered; Identify current Vulnerabilities that may exist looking at the weaknesses that attackers may exploit. The following sub-topics should be addressed:
P2V and best practices
Virtualization Performance issues
Virtualization Vulnerabilities
Security threats