Download Publication

Analyzing Log Data with AI Models
Release Date: 09/15/2025
Updated On: 09/16/2025
- Why logs are essential to Zero Trust visibility and decision-making
- How AI models enhance pattern recognition, threat detection, and event correlation
- Techniques for applying AI/ML to large-scale log data, including federated learning
- Practical benefits for SOC efficiency, faster incident response, and compliance
Download this Resource
Acknowledgements

Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA
Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).
I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.
Linke...

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.
He has co-chaired...

Shamik Kacker

Shruti Kulkarni
Information Security Architect, Elexon
I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...

Chandra Rajagopalan
Principal Engineer, Netskope
Chandra Rajagopalan is a seasoned professional in cloud security and software, with over 20 years of industry experience. With more than ten approved patents in cybersecurity and computing, Chandra's technical acumen and deep insights are evident. His contributions to the Cloud Security Alliance (CSA), particularly in Zero Trust, highlight his dedication to advancing cybersecurity standards. Notably, he played a pivotal role in developing t...

Joe Young

Rohini Sulatycki
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more