Help CSA Develop a New SDP Training - Join the SDP Expert Group
Blog Article Published: 01/24/2021
Join the Software Defined Perimeter Expert Group
CSA is looking for volunteers to join the CSA Software Defined Perimeter (SDP) Expert Group to help review and advise on the scope, curriculum, objectives, structure, go-to-market strategy and value proposition for an 8 hour CSA SDP Training.
This group would help ensure that the perspective of all the stakeholders and relevant job functions are taken into consideration (SDP product vendors, SDP consultant, existing and potential SDP users, auditors, etc). They would also support CSA in defining and reviewing the SDP content and serve as SDP training ambassadors.
Time commitment
The group will initially meet weekly, then bi-weekly with a dedicated Circle group launched for continuous communications between meetings. The time investment would be approximately 4 hours per month minimum. For more information or to submit a request to participate in the CSA SDP Expert Group, please send your inquiries to [email protected].
The Expert Group will help CSA in:
- Defining the curriculum, structure and learning objectives of the SDP.
- Suggest future extension of the SDP curriculum
- Provide recommendations on a possible SDP Certification/Certificate
Who should apply to join this group?
Expert Group members must have knowledge in some of the following key areas:
- Software Defined Perimeter
- Networking (including 5G networks and service)
- Zero Trust Architecture and other Security Architectures design/implementation/management
- Identity, Credential and Access Management
- Authentication and Authorization
- Cloud Security
- IoT Security
- Candidate members should also be familiar with CSA’s body of knowledge on SPD.
To view the full details about this group you can view the expert group charter here.
For more information or to submit a request to participate in the CSA SDP Expert Group, please send your inquiries to [email protected].
Trending This Week
#1 The 5 SOC 2 Trust Services Criteria Explained
#2 What You Need to Know About the Daixin Team Ransomware Group
#3 Mitigating Security Risks in Retrieval Augmented Generation (RAG) LLM Applications
#4 Cybersecurity 101: 10 Types of Cyber Attacks to Know
#5 Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers
Related Articles:
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
Published: 04/24/2024
What’s in a Name? Defining Zero Trust for Leaders
Published: 04/22/2024
Implementing a Data-Centric Approach to Security
Published: 04/19/2024
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Published: 04/18/2024