Cloud 101
Circle
Events
Blog

Event Presentations

Event Presentations

Browse Event Presentations

Zero Trust Virtual Summit Session Recordings

Zero Trust Virtual Summit Session Recordings
Release Date: 11/17/2022

Featuring a world-class program of speakers and panelists, CSA's Virtual Zero Trust Summit delivered critical insights into a variety of Zero Trust focuse...

Request to download
4 Use Cases for Cloud Detection and Response in the SOC

4 Use Cases for Cloud Detection and Response in the SOC
Release Date: 11/14/2022

In this presentation, Keith Mokris, VP of Cloud Security Evangelism at Orca Security, will expand on four use cases straight from the Security Operations ...

Request to download

Key Challenge Testing Report #1
Release Date: 11/07/2022

Request to download
CSA MITRE CAVEaT Tabletop Exercise

CSA MITRE CAVEaT Tabletop Exercise
Release Date: 10/14/2022

Join us as CSA’s Director of Research John Yeoh introduces the Joint CSA-MITRE Cloud Adversarial, Vectors, and Threats (CAVEaT) Collaboration to develop, ...

Request to download
2022 State of Federal Cloud Security

2022 State of Federal Cloud Security
Release Date: 10/13/2022

The US Federal Government has been headed into the cloud since the introduction of its Cloud First policy in 2011. Since then, a series of executive order...

Request to download
Advancing Cloud Security Automation

Advancing Cloud Security Automation
Release Date: 10/13/2022

Security plays an instrumental role in the rapidly evolving cloud landscape. NIST and CSA provide fundamental guidance and tools to help organizations add...

Request to download
The Slow Gazelle

The Slow Gazelle
Release Date: 10/13/2022

Are you predator or are you prey?  Things haven't changed much in more than 2 decades of failure and much like the slow gazelle in the wild we are ripe fo...

Request to download
Software Transparency: Securing the Digital Supply Chain

Software Transparency: Securing the Digital Supply Chain
Release Date: 10/13/2022

This session will discuss relevant events and emerging requirements of the software supply chain. It will be touching on topics such as SolarWinds, Log4j,...

Request to download
Weaponizing Ambiguity

Weaponizing Ambiguity
Release Date: 10/13/2022

As technology evolves, security programs are increasingly becoming larger and more complex. Success isn’t a given when a program grows, adds new capabilit...

Request to download
Trust but Verify: Avoiding Cybersecurity Blind Spots

Trust but Verify: Avoiding Cybersecurity Blind Spots
Release Date: 10/11/2022

Have you ever wondered why some organizations don’t seem to have problems with cybersecurity? As an example, have you ever heard about a FedRAMP certified...

Request to download
Policy-as-Code

Policy-as-Code
Release Date: 10/07/2022

CSA’s Cloud Controls Matrix (CCM) and other frameworks provide a comprehensive approachto identifying controls to meet security, risk, and compliance requ...

Request to download
Reporting Risk in the Cloud

Reporting Risk in the Cloud
Release Date: 10/07/2022

Without a holistic way of reporting metrics such as key performance and risk indictors in the cloud, financial institutions often struggle to track and ar...

Request to download
Cloud Privacy GRC

Cloud Privacy GRC
Release Date: 10/07/2022

Cloud providers, other tech companies and heavy cloud users are particularly challenged to implement and mature their privacy governance, risk management ...

Request to download
Transforming Information Security for Businesses of All Sizes

Transforming Information Security for Businesses of All Sizes
Release Date: 10/07/2022

In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transform...

Request to download
Taming Multi-Cloud Identity with a New Standard

Taming Multi-Cloud Identity with a New Standard
Release Date: 10/07/2022

Gartner projects 80% of corporate IT will be cloud-based by 2025, with 81% using two or more cloud platforms. Since each cloud platform has its own identi...

Request to download
The Future of Work is Probably Not What You Think

The Future of Work is Probably Not What You Think
Release Date: 10/07/2022

This presentation will challenge conventional thinking about how the tech workforce will evolve in the faceof (1) a persistently volatile marketplace for ...

Request to download
How NTT DATA embarked on the Zero Trust Journey

How NTT DATA embarked on the Zero Trust Journey
Release Date: 10/05/2022

2022 is about Zero Trust being the number one priority of every organization’s cybersecurity roadmap. On May 12th 2021, an Executive Order turned into pol...

Request to download
An Executive View on How Zero Trust Protects Organizations by Securely Connecting Users to Resources from Anywhere

An Executive View on How Zero Trust Protects Organizations by Securely Connecting Users to Resources from Anywhere
Release Date: 10/05/2022

What is Zero Trust and Security Service Edge? What are the best practices to create an effective Zero Trust strategy that aligns with NIST 800-207? Does t...

Request to download
Take a Deep Dive Into Common SaaS Data Breaches — And How to Avoid Them

Take a Deep Dive Into Common SaaS Data Breaches — And How to Avoid Them
Release Date: 10/05/2022

SaaS adoption has exploded over the past decade. What used to be point solutions are now fully developed platforms with large ecosystems of connected appl...

Request to download
Protect Every Application on Any Cloud

Protect Every Application on Any Cloud
Release Date: 10/05/2022

At organizations with multi-cloud operations, security teams face deeper complexity when securing applications and workloads across environments.Luckily, ...

Request to download