Cloud 101CircleEventsBlog
Register for CSA's AI Summit at RSAC on May 6!

Contribute to CSA Research

Home
Contribute

Open Peer Reviews

Identity and Access Management - CCSK v5 Study Guide

Open Until: 03/19/2024

In both public and private clouds, multiple parties are required to manage IAM without compromising security. This domain f...

Relationship of Shadow Access with Zero Trust and Artificial Intelligence

Open Until: 04/06/2024

Shadow Access, a growing concern in cloud computing, refers to unintended, unauthorized access to systems and data, often i...

AI Organizational Responsibilities - Core Security Responsibilities

Open Until: 04/06/2024

This white paper focuses on what we define as an enterprise's "core security responsibilities" around Artificial Intelligen...

AI Governance & Compliance in the Industry

Open Until: 04/06/2024

Governance and compliance serve as integral components of organizational management, ensuring adherence to regulations, sta...

Surveys

Top Threats 2024 Survey

Abstract:
The goal of this survey is to determine the top threats, vulnerabilities, and risks organizations are facing in 2024. The results of this survey will be used in the next installments of the Top Threats reports.
Length: 7 minutes, up to 35 questions
Deadline: March 13th