ChaptersCircleEventsBlog

Download Publication

Top Threats Working Group Charter 2025
Top Threats Working Group Charter 2025

Top Threats Working Group Charter 2025

Release Date: 02/04/2025

The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help make educated risk-management and cloud adoption decisions. This group hopes to make using cloud services safer.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
Enterprise Authority To Operate (EATO) Auditing Guidelines
Enterprise Authority To Operate (EATO) Auditing...
Don’t Buy A Network Pen Test Until You Ask These Questions
Don’t Buy A Network Pen Test Until You Ask These Questions
Published: 03/28/2025
How To Transform Your GRC with Continuous Controls Monitoring
How To Transform Your GRC with Continuous Controls Monitoring
Published: 03/26/2025
Zero Trust Makes Cybersecurity Everyone's Responsibility
Zero Trust Makes Cybersecurity Everyone's Responsibility
Published: 03/25/2025
Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success
Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success
Published: 03/25/2025

Acknowledgements

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Alexander Getsin
Alexander Getsin

Alexander Getsin

Alexander Stone Getsin is a financial technologies security leader with particular expertise and interest in cloud security, secure application design, and security governance. Alex is the lead author of industry security best practices, particularly with the Cloud Security Alliance, Top Threats research group, and the (ISC)2 Israeli Chapter, which he helps champion as a co-chairman. Alex leverages a decade of experience in finance, militar...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Read more

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training