Download Publication
Security Guidance for Critical Areas of Mobile Computing
Release Date: 11/08/2012
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Luciano (J.R.) Santos
Chief Customer Officer, CSA
J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...
Kendall Scoboria
Evan Scoboria
Technology Director, CSA
Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...
Aaron Alva
Bernd Jaeger
Colt (Germany)
Working for more than 20 years within the ICT industry, focussing on information security, Bernd’s scope ranges from security management related activities down to a deep, “hands-on” level of understanding of today’s threats and countermeasures.
Working for Telecommunication-, Internet-, Cloud and Technology Service provider, Bernd designed and implemented highly customized security solutions, developed technical blueprints and produc...
David Lingenfelter
Security and Compliance, MaaS360
David is a seasoned security professional with nearly 20 years of experience in risk management, information security, compliance, and policy development. Throughout his career David has performed risk and vulnerability assessments along with making recommendations on network and system design improvements. David’s career has spanned from traditional hardware based security architectures to cloud technologies and virtual environments.
Henry St. Andre
Director of Trust Services for inContact
Henry St. Andre began his career in telecommunication 32 years ago, in 1984 during the break-up and divestiture of AT&T. He served as Director of Operations for over 25 years working for several different regional telecommunications providers and ultimately because the Director of Operations for inContact before being asked to be the Director of Trust Services at inContact, with the mission to create a security team and operations that coul...
Eiji Sasahara
Board of Director at CSA Japan Chapter
Cesare Garlati
Chief Security Strategist at prpl Foundation
Cesare Garlati is an internationally renowned leader in information security. Former Vice President of mobile security at Trend Micro, Cesare currently serves as Chief Security Strategist at prpl Foundation and Co-chair of the Mobile Working GroupCloud Security Alliance. Prior to Trend Micro, Mr. Garlati held director positions within leading mobility companies such as iPass, Smith Micro Software and W...
Guido Sanchidrian
Sandeep Mittal
Pamela Fusco
Robert de Monts
Nader Henein
Alice Decker
Freddy Kasprzykowski
Allen Lum
Sam Wilke
Giles Hogben
Megan Bell
James Hunter
Mats Naslund
Dan Hubbard
Chief Technology Officer for OpenDNS
Dan Hubbard is Chief Security Architect at Lacework, driving innovation and expanding the company’s security strategy for public and private clouds. A pioneering force in Internet security, Dan’s expertise spans from reputation and advancedsystems to large-scale security data mining, and cloud security. Prior to Lacework, Dan was CTO at OpenDNS, helped deliver the world’s largest cloud secu...
Eric Fisher
Steven Michalove
Vladimir Jirasek
Somanath NG
Jane Cosnowsky
Subbu Iyer
Paul Madsen
Jay Musterman
Tyler Shields
Nadeem Bhukari
Steve Dotson
Yvette Agostini
Andrea Berther
Randy Cadenhead
Harish Chaihan
Mushegh Hakhinian
Naveed Hamid
Sachin Jain
Matt Leipnik
Sandeep Mahajan
Dale Nacke
Glenn Schoonover
Mason White
Mark Cunningham
Matt Broda
Randy Bunnell
William Corrington
Chris Garrett
Daniel Miessler
Jeff Shaffer
Govind Tatachari
Tom Jones
Ionnis Kounelis
Morey Straus
Satheesh Sudarsan
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more