Download Publication
Cloud Security and Technology Maturity Survey
Release Date: 02/03/2022
- Current cloud use and strategy
- Top drivers for using multi-cloud environments
- Current and future cloud security strategies and solutions
- Predicted changes in the use of cloud and related technologies
Download this Resource
Acknowledgements
Shamun Mahmud
Senior Research Analyst, CSA
Ramses Gallego
Josh Buker
Research Analyst, CSA
Preeti Bheesikar
Carole Murphy
Akash Gupta
Krishna Pandey
Shirish Verma
Manjesh Pai
Sailaja Vadlamudi
Sujatha Yakasari
Hillary Baron
Senior Technical Director - Research, CSA
Sean Heide
Technical Research Director, CSA
Alex Kaluza
Research Analyst, CSA
Harley Adams
Brent Jenkins
Spiros Liolis
Stan Wisseman
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Satyavathi Divadri
With over 24 years of experience in IT and cyber security across various business sectors that include BFSI, Telecom,BPO, Media, and IT/ITSE, Satya is the go-to person for critical security projects. She is the Global head of enterprise security architecture and Cloud CTO at CyberRes, a Micro Focus line of business. She also serves on the board of nonprofit organization i.e., Chairman of Cloud Security Alliance, Bangalore, Global Advisory ...
Vandana Verma
Madhukeshwar Bhat
Joe Leung
Niel Pandya
Pooja Agrawalla
Savitha Gowda
Akshata Mongha
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more