Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Best Practices for Cyber Incident Exchange
Best Practices for Cyber Incident Exchange

Best Practices for Cyber Incident Exchange

Release Date: 04/16/2018

Working Group: Data Security

No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pace. New attacks are directed at dozens of companies within the first 24 hours and hundreds within a few days.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
Establishing an Always-Ready State with Continuous Controls Monitoring
Establishing an Always-Ready State with Continuous Controls Monitoring
Published: 11/21/2024
AI-Powered Cybersecurity: Safeguarding the Media Industry
AI-Powered Cybersecurity: Safeguarding the Media Industry
Published: 11/20/2024
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Ryan Bergsma
Ryan Bergsma
Technology Director and Security Manager, CSA

Ryan Bergsma

Technology Director and Security Manager, CSA

Dave Cullinane
Dave Cullinane
TruSTAR Founder and CSA Chairman

Dave Cullinane

TruSTAR Founder and CSA Chairman

Dave Cullinane is the Founder of TruSTAR Technology. Prior to TruSTAR, Dave served for 5+ years as the Chief Information Security Officer and VP of Global Fraud, Risk and Security for eBay and its many global businesses (StubHub, InternetAuction.co, GSI Commerce). He has more than 30 years of professional security experience building and managing cyber security and incident response teams.

Dave is also the past President and Chair...

Read more

Ramses Gallego Headshot Missing
Ramses Gallego

Ramses Gallego

Stacy Simpson Headshot Missing
Stacy Simpson

Stacy Simpson

Richard Zhao
Richard Zhao
Chief Strategy Officer of NSFOCUS

Richard Zhao

Chief Strategy Officer of NSFOCUS

Dr. Liang ZHAO (Richard) manages the research team, strategic planning, and fosters innovations at NSFOCUS. He obtained his B.Sc, M.Sc. and Ph.D degrees from Peking University at 1991, 1994, 1997 respectively. Liang majored physics and fiber-optic communications and has over 15 years of professional experience in telecom and network security areas. He owns certifications of CISSP, ITIL, BS7799.

Prior to his current position, he was th...

Read more

Olivier Caleff
Olivier Caleff

Olivier Caleff

Olivier has been instrumental in engaging the entire CSA EMEA community with the CSA CIRCLE platform. He has embraced the CIRCLE platform, created a newsletter, and posts discussion topics to various communities each week. In addition to embracing and engaging with CIRCLE, Olivier continues to be a guiding force in promoting CSA and cloud security best practices in France and Switzerland. Olivier has been a contributor to CSA research by ...

Read more

Carlos Samaniego Headshot Missing
Carlos Samaniego

Carlos Samaniego

Edgar Odenwalder Headshot Missing
Edgar Odenwalder

Edgar Odenwalder

Kavya Pearlman Headshot Missing
Kavya Pearlman

Kavya Pearlman

Brian Kelly Headshot Missing
Brian Kelly

Brian Kelly

Krishna Narayanaswamy Headshot Missing
Krishna Narayanaswamy

Krishna Narayanaswamy

Rich Phillips
Rich Phillips
Enterprise and Security Architect at Worldwide Technology

Rich Phillips

Enterprise and Security Architect at Worldwide Technology

Mariano Benito
Mariano Benito
CISO at GMV

Mariano Benito

CISO at GMV

Mariano J. Benito is CISO at GMV, a leading Spanish company in the cybersecurity field, and CSA Spanish Chapter task force (CSA-ES CTO). Along his twenty-year long career, he has contributed to the development and implementation of international standards, including ISO 27001 & 22031 at GMV. Mariano J. Benito has also developed a specific focus also on Cloud Computing, Compliance & Governance, being the author of the first security analysis...

Read more

Elvis Hover Headshot Missing
Elvis Hover

Elvis Hover

Leo Magallan Headshot Missing
Leo Magallan

Leo Magallan

Christine Mullaney Headshot Missing
Christine Mullaney

Christine Mullaney

David Neuman Headshot Missing
David Neuman

David Neuman

Jeff Valdes Headshot Missing
Jeff Valdes

Jeff Valdes

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training