ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Announcements

Announcements
AI Log Analysis for Event Correlation in Zero Trust
AI Log Analysis for Event Correlation in Zero Trust

September 26, 2025

Tackling Enterprise AI Risks with Insights from Industry & Academia
Tackling Enterprise AI Risks with Insights from Industry & Academia

Join CSA and Northeastern University for free on Oct 28

September 25, 2025

Now accepting speaker submissions for the 2025 AGM hosted by Telefónica Tech (EN)
Now accepting speaker submissions for the 2025 AGM hosted by Telefónica Tech (EN)

September 25, 2025

SaaS Security Capability Framework (SSCF)
SaaS Security Capability Framework (SSCF)

September 23, 2025

Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP
Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP

September 23, 2025

The First AI Model Security Leaderboard
The First AI Model Security Leaderboard

Confident AI Decisions Start with RiskRubric

September 17, 2025

How AI coding tools can learn to develop secure software
How AI coding tools can learn to develop secure software

Reversing Labs

September 17, 2025

First-of-Its-Kind AI Model Security Leaderboard
First-of-Its-Kind AI Model Security Leaderboard

Your Guide to Secure, Reliable AI Models

September 17, 2025

5 steps for deploying agentic AI red teaming
5 steps for deploying agentic AI red teaming

CSO

September 17, 2025

An Update on European Compliance: NIS2, CRA, DORA
An Update on European Compliance: NIS2, CRA, DORA

September 17, 2025

Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region

September 16, 2025

The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy

September 15, 2025

The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy

September 15, 2025

Fortifying the Agentic Web: A Unified Zero Trust Architecture Against Logic-Layer Threats
Fortifying the Agentic Web: A Unified Zero Trust Architecture Against Logic-Layer Threats

September 12, 2025

CSA San Francisco & OWASP Bay Area Meetup
CSA San Francisco & OWASP Bay Area Meetup

Tuesday, September 23 | 5 - 8pm PDT

September 11, 2025

From Policy to Prediction: The Role of Explainable AI in Zero Trust Cloud Security
From Policy to Prediction: The Role of Explainable AI in Zero Trust Cloud Security

September 9, 2025

The State of Cloud and AI Security 2025
The State of Cloud and AI Security 2025

September 9, 2025

The AI Exchange: Innovators in Payment Security Featuring Cloud Security Alliance 
The AI Exchange: Innovators in Payment Security Featuring Cloud Security Alliance 

PCI Security Standards Council

September 8, 2025

What is Continuous Compliance, and How Can Your Team Actually Achieve It?
What is Continuous Compliance, and How Can Your Team Actually Achieve It?

September 8, 2025

Achieving Resilience Through Zero Trust
Achieving Resilience Through Zero Trust

September 8, 2025