Download Publication
SecaaS Category 7 // Security Information and Event Management Implementation Guidance
Release Date: 10/29/2012
Working Group: Security as a Service
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Luciano (J.R.) Santos
Chief Customer Officer, CSA
J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...
Kendall Scoboria
Evan Scoboria
Technology Director, CSA
Aaron Alva
Bernd Jaeger
Colt (Germany)
Working for more than 20 years within the ICT industry, focussing on information security, Bernd’s scope ranges from security management related activities down to a deep, “hands-on” level of understanding of today’s threats and countermeasures.
Working for Telecommunication-, Internet-, Cloud and Technology Service provider, Bernd designed and implemented highly customized security solutions, developed technical blueprints and produc...
Vicki Hahn
Jean Pawluk
Jens Laundrup
Chief Security Engineer and Executive Consultant, Emagined Security Inc.
Jens Laundrup, Chief Security Engineer and Executive Consultant, Emagined Security Inc., has spent over 30 years in the Information Security space to include numerous security engineering disciplines including Military, Government and Corporate Information Security, Compliance Program Design, Architecture Design, and Network & Physical Security. Mr. Laundrup has led the development and design of cutting-edge risk-based security programs and...
Anish Mohammed
Moshe Ferber
Chairman at Cloud Security Alliance, Israel
Moshe Ferber is a recognized industry expert and popular public speaker, with over 20 years’ experience at various positions ranging from the largest enterprises to innovative startups. Currently Ferber focuses on cloud security as certified instructor for CCSK & CCSP certification and participate in various initiative promoting responsible cloud adoption.
Phil Cox
Andrea Bilobrk
Dr. Yale Li
Yale Li was a Microsoft’s Principal Security Architect responsible for data security, applications development security, and emerging market security in SAFE-T (Security Accelerator for Emerging Technologies) team. Yale was Graduate Education Partner at the Center of Information Assurance and Cyber Security at the University of Washington, and CEO’s Advisor of multiple Microsoft partner companies. As a security professional, Yale worked on ...
Andrew Hay
Atul Shah
Robert Gutcho
Wendy Cohen
Director at GTB Technologies, Inc
Wendy is a seasoned Global Operations / Data Security Executive with extensive experience and a successful track record in both start-up and public companies. Currently Wendy is a Director at GTB Technologies, Inc. a leading independent Datafirm. In this role, Wendy applies over 15 years of experience to create data protection services for both the company’s internal networks as well as its’ cl...
Rizwan Ahmad
Hament Mahajan
Karthik Murthy
Paul Swinton
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more