Cloud 101
Circle
Events
Blog

Event Presentations

Event Presentations

Browse Event Presentations

SECtember Presentations Bundle
Release Date: 09/20/2021

This is a Cloud Security Alliance Bundle containing 17 resources.

Request to download
Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach

Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach
Release Date: 09/19/2021

Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f...

Request to download
Cloud Native Security & Policy Management

Cloud Native Security & Policy Management
Release Date: 09/19/2021

Improved security is a key benefit of cloud-native technologies, because of immutability and segregation of resources in containers, microservices, server...

Request to download
Protecting Against the Future of Ransomware

Protecting Against the Future of Ransomware
Release Date: 09/19/2021

With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t...

Request to download
Zero Trust Frameworks: The Major Approaches

Zero Trust Frameworks: The Major Approaches
Release Date: 09/19/2021

This talk examines the major frameworks for Zero Trust security: Forrester ZTX, NIST SP800-207, and Google BeyondCorp. Each has its own philosophy, but th...

Request to download
Metrics and Measurements for the CSA CCM

Metrics and Measurements for the CSA CCM
Release Date: 09/19/2021

A number of the controls in the most current version of the CSA’s Cloud Controls Matrix require that the organization develop and implement metrics. Also,...

Request to download
Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more

Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more
Release Date: 09/19/2021

Threat modeling is an essential practice for software and systems security. Cloud threat modeling expands on standard threat modeling practices to account...

Request to download
Is Bug Bounty Right For You?

Is Bug Bounty Right For You?
Release Date: 09/19/2021

Bug bounties have become ubiquitous in the last several years, allowing companies to leverage extension talent pools outside of their formal employment.  ...

Request to download
Setting Common Language when Talking to Leadership about IT Risks

Setting Common Language when Talking to Leadership about IT Risks
Release Date: 09/19/2021

To be successful in presenting IT security to senior leadership, it's important it is done in a way that they can ingest, process, and understand; because...

Request to download
Delivering Continuous Compliance using CSA CCM and NIST OSCAL

Delivering Continuous Compliance using CSA CCM and NIST OSCAL
Release Date: 09/19/2021

In our rapidly changing information technology portfolios, compliance, as imagined typically, does not match compliance as implemented.  CSA has recently ...

Request to download
Think Fast! - Machine Learning for Improved Security

Think Fast! - Machine Learning for Improved Security
Release Date: 09/19/2021

Cloud computing has ushered in an explosion of tools and resources to swiftly adapt applications, business processes, and even create entire industries. W...

Request to download
Emergence, Divergence & Convergence: Adapting to Disparate Clouds

Emergence, Divergence & Convergence: Adapting to Disparate Clouds
Release Date: 09/19/2021

Learn how to start adapting your security skills and approach to governance to navigate and succeed in the ever-growing world of disparate clouds, standar...

Request to download
Head in the clouds, feet on the ground.

Head in the clouds, feet on the ground.
Release Date: 09/19/2021

Even before the pandemic, people were losing the ability to be in the moment. Future generations will ask what it was like living through the COVID-19 Pan...

Request to download
Using the CSA CAIQ for Acquisition Diligence

Using the CSA CAIQ for Acquisition Diligence
Release Date: 09/19/2021

If you are considering acquiring tech companies, it’s a terrible mistake to ignore their security posture in the current threat climate. The CSA CAIQ (Con...

Request to download
Trust in Security Automation – The Key to Defending the Expanding Threat Landscape

Trust in Security Automation – The Key to Defending the Expanding Threat Landscape
Release Date: 09/19/2021

With cyberattack volumes growing exponentially, the only way to gain the upper hand against attackers is to integrate automation into your cybersecurity a...

Request to download
Not Another Boring Cyber Insurance Discussion - The State and Future of Cyber Insurance

Not Another Boring Cyber Insurance Discussion - The State and Future of Cyber Insurance
Release Date: 09/19/2021

Based upon the published OMG discussion paper, The State and Future of Cyber Insurance, the co-authors will briefly present the synopsis of the paper, lea...

Request to download
Protecting the Privacy of Healthcare Data in the Cloud

Protecting the Privacy of Healthcare Data in the Cloud
Release Date: 09/19/2021

Privacy is concerned with decisions about legitimate access to, use of, and alteration of information. Privacy establishes a framework for deciding who sh...

Request to download
A Framework for Succeeding in Digital Transformation

A Framework for Succeeding in Digital Transformation
Release Date: 09/19/2021

Digital transformation has become a business imperative for nearly every organization.  However, progress in achieving transformation goals has been slow ...

Request to download