Browse Event Presentations
![]() | CSA Cloud Threat Modeling Tabletop Exercise Threat modeling is essential for cybersecurity programs in order to identify risks that could impact business operations. Whether this is during a DevSecO... Request to download |
![]() | Rethinking How We Approach and Implement Security Well The unprecedented scale enabled by the cloud revolution has come at a cost: an explosive growth in vulnerability, as each SaaS platform and cyber asset ad... Request to download |
![]() | CSA Cloud Threat Modeling Tabletop Exercise MN Summit with John Yeoh, Sean Heide and Jon-Michael Brook Request to download |
![]() | Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j Request to download |
![]() | Enabling Clouds, Together CSA Minnesota Summit,Param Vig, President, Cloud Security Alliance, Minnesota Chapter Request to download |
![]() | Charting the course through Disruption In this presentation, J.R. Santos, Chief Customer Officer for the Cloud Security Alliance, will share his vision for the direction of CSA, discussing the ... Request to download |
![]() | CSA Federal Summit 2021: FedRAMP Automation FedRAMP has seen an incredible increase in the adoption of the program, both in agency participation and reuse of authorizations. FedRAMP's Program Manage... Request to download |
![]() | CSA Chapter Summit Links A collection of resources and links that were referenced throughout the event. Request to download |
![]() | CCM V4 what's new? Deep dive into the new CSA cloud security framework. The presentation will specifically focus on the Implementation and Auditing Guidelines and will give the audience an understanding of how to use them in o... Request to download |
![]() | CSA Research In this session, we will discuss the latest and most popular CSA research as well as review our research roadmap. Request to download |
![]() | CCSK, CCAK, and The Relationship Between the Two The presentation will cover the target audience and the relationship between the certificates and the different training offerings available. This present... Request to download |
![]() | CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance Cloud adoption has been growing rapidly over the years due to business benefits such as cost savings, scalability, increased security, ease of deployment.... Request to download |
![]() | Auditing and Compliance in Cloud-native Environments, Chris Hughes, Co-Founder and CISO, Aquia Why you need a SaaS governance plan, and what should be in itThe rapid proliferation of authorized and unauthorized software-as-a-service solutions prese... Request to download |
![]() | Shifting Left the Right Way with OSCAL, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, National Institute of Standards and Technology (NIST/ITL) A key component of the Cloud Development Lifecycle (CDLC) is the early development phase involving infrastructure as code (IaC), which is used to define a... Request to download |
![]() | 2021 State of Federal Cloud Security; A Practitioners Perspective, Dr. Mari J. Spina, Principal Cyber Security Engineer, The MITRE Corp. The US Federal Government has been headed into the cloud since introduction of its Cloud First policy in 2011. Since then a series of executive orders and... Request to download |
![]() | Protecting Against the Future of Ransomware With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t... Request to download |
![]() | Zero Trust Frameworks: The Major Approaches This talk examines the major frameworks for Zero Trust security: Forrester ZTX, NIST SP800-207, and Google BeyondCorp. Each has its own philosophy, but th... Request to download |
![]() | Metrics and Measurements for the CSA CCM A number of the controls in the most current version of the CSA’s Cloud Controls Matrix require that the organization develop and implement metrics. Also,... Request to download |
![]() | Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more Threat modeling is an essential practice for software and systems security. Cloud threat modeling expands on standard threat modeling practices to account... Request to download |
![]() | Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f... Request to download |